Infosecurity.US

Information Security & Occasional Forays Into Adjacent Realms

  • Web Log

Circle City Con 5.0 2018, Kyle Ehmke's 'Applying Thermodynamic Principles to Threat Intelligence' →

July 15, 2018 by Marc Handelman in Conferences, Education, Information Security, Threat Intel Reporting, Threat Intelligence, Threat Modeling, Circle City Con
July 15, 2018 /Marc Handelman
Conferences, Education, Information Security, Threat Intel Reporting, Threat Intelligence, Threat Modeling, Circle City Con

Circle City Con 5.0 2018, Luka Trbojevic's 'Security Beyond The Security Team: Getting Everyone Involved' →

July 12, 2018 by Marc Handelman in Conferences, Education, Information Security, Risk Management, Risk, Threat Intelligence, Circle City Con
July 12, 2018 /Marc Handelman
Conferences, Education, Information Security, Risk Management, Risk, Threat Intelligence, Circle City Con

Well-crafted by Pinterest User and Lego Master Andrew Becraft, also Here...

Modeling Threats, The Regalia Of Precision

July 06, 2018 by Marc Handelman in Threat Modeling, Threat Intelligence, Information Security

Crispin Cowan of Leviathan Security, illuminates a vital component of both Information Security and Cyber Security with superb precision in his post The Calculus of Threat Modeling at the Leviathan Security Blog. Detailing both the Theory and Practice of Threat Modeling - his well-crafted thought processes are clearly presented and eminently defensible. If you read anything today on Threat Modeling, read Cripsin's work, you'll be glad you did! Certainement, il Faut Lire Aujourd Hui H/T

July 06, 2018 /Marc Handelman
Threat Modeling, Threat Intelligence, Information Security

BSides Detroit 2018, Nir Yosha's 'Know The Enemy - How To Make Threat Intelligence Work!' →

May 29, 2018 by Marc Handelman in Conferences, BSides, BSides Detroit, Education, Information Security, Threat Intelligence
May 29, 2018 /Marc Handelman
Conferences, BSides, BSides Detroit, Education, Information Security, Threat Intelligence

Advanced Persistent Infrastructure →

November 22, 2017 by Marc Handelman in Threat Intelligence, Threat Modeling, Invasion, Flawed Infrastructure, Information Security

Curtis Jordan, writing at Dark Reading, regales us with a tale of Advanced Persistent Infrastructure, the underpinnings of cyberevil; and, today's paean to Threat Intelligence - Enjoy!

November 22, 2017 /Marc Handelman
Threat Intelligence, Threat Modeling, Invasion, Flawed Infrastructure, Information Security

Converge 2017, Mike Behrmann's 'New School Security Combat Mindset' →

June 12, 2017 by Marc Handelman in Conferences, Education, Information Security, Threat Intelligence, Incident Handling, Incident Response, Incident Management
June 12, 2017 /Marc Handelman
Conferences, Education, Information Security, Threat Intelligence, Incident Handling, Incident Response, Incident Management

BSides Nashville 2017, Joe Grey's & Ben Shipley's 'Marrying Incident Response and Threat Intel Within Your Enterprise' →

May 18, 2017 by Marc Handelman in BSides, Incident Handling, Incident Response, Information Security, Threat Intelligence
May 18, 2017 /Marc Handelman
BSides, Incident Handling, Incident Response, Information Security, Threat Intelligence

BSides Nashville 2017, Chris Sanders ' 'Abstract Tools for Effective Threat Hunting' →

May 08, 2017 by Marc Handelman in Threat Intelligence, Intelligence, Information Security
May 08, 2017 /Marc Handelman
Threat Intelligence, Intelligence, Information Security

SANS CTI 2017, Aaron Shelmire's 'Effective Threat Intel Management' →

April 12, 2017 by Marc Handelman in All is Information, Education, Conferences, Threat Intelligence
April 12, 2017 /Marc Handelman
All is Information, Education, Conferences, Threat Intelligence

SANS CTI 2017, Dave Herrald's and Ryan Kovar's 'The Threat Intel Victory Garden: Threat Intelligence Using Open Source Tools' →

April 10, 2017 by Marc Handelman in All is Information, Conferences, Education, Data Science, Data That Is Big, Intelligence, Threat Intelligence
April 10, 2017 /Marc Handelman
All is Information, Conferences, Education, Data Science, Data That Is Big, Intelligence, Threat Intelligence

SANS CTI 2017, Elias Fox's 'Integrating Cyber Threat Intelligence using Classic Intel Technique' →

April 07, 2017 by Marc Handelman in All is Information, Conferences, Education, Intelligence, Threat Intelligence
April 07, 2017 /Marc Handelman
All is Information, Conferences, Education, Intelligence, Threat Intelligence

SANS CTI 2017, Jeremy Johnson's 'Using Intelligence to Heighten your Defense' →

April 06, 2017 by Marc Handelman in All is Information, Conferences, Education, Intelligence, Threat Intelligence
April 06, 2017 /Marc Handelman
All is Information, Conferences, Education, Intelligence, Threat Intelligence

SANS CTI 2017, Matt Bromiley's 'Using CTI Against the World's Most Successful Email Scam' →

March 30, 2017 by Marc Handelman in All is Information, Conferences, Education, Threat Intelligence
March 30, 2017 /Marc Handelman
All is Information, Conferences, Education, Threat Intelligence

SANS CTI 2017, Rick Holland's 'Inglorious Threat Intelligence' →

March 29, 2017 by Marc Handelman in All is Information, Conferences, Devices, Threat Intelligence
March 29, 2017 /Marc Handelman
All is Information, Conferences, Devices, Threat Intelligence

SANS CTI 2017, Rob Dartnall's 'Conventional Intelligence Analysis in Cyber Threat Intelligence' →

March 28, 2017 by Marc Handelman in All is Information, Conferences, Education, Threat Intelligence
March 28, 2017 /Marc Handelman
All is Information, Conferences, Education, Threat Intelligence

SANS CTI 2017, Sergio Caltagirone's 'Threat Intelligence At Microsoft: A Look Inside' →

March 27, 2017 by Marc Handelman in All is Information, Conferences, Education, Forensication, Threat Intelligence
March 27, 2017 /Marc Handelman
All is Information, Conferences, Education, Forensication, Threat Intelligence

CTI Summit 2017, Threat Intelligence At Microsoft - A Look Inside →

March 14, 2017 by Marc Handelman in All is Information, Conferences, Information Sciences, Intelligence, Threat Intelligence
March 14, 2017 /Marc Handelman
All is Information, Conferences, Information Sciences, Intelligence, Threat Intelligence

CTI SUMMIT 2017, Robert M. Lee's - Knowing When to Consume Intelligence and When to Generate It →

March 13, 2017 by Marc Handelman in All is Information, Information Security, Threat Intelligence, Intelligence, Conferences, Education

H/T

March 13, 2017 /Marc Handelman
All is Information, Information Security, Threat Intelligence, Intelligence, Conferences, Education

J4VV4D, Defining Threat Intelligence →

May 03, 2016 by Marc Handelman in All is Information, Information Security, Intelligence, Intelligence Sharing, Threat Intelligence
May 03, 2016 /Marc Handelman
All is Information, Information Security, Intelligence, Intelligence Sharing, Threat Intelligence
Edwin T. Layton, Rear Admiral, United States Navy Ribbon Bar

Edwin T. Layton, Rear Admiral, United States Navy Ribbon Bar

Intelligence QOTD, Edwin Layton, RADM, USN →

December 14, 2015 by Marc Handelman in All is Information, Alternate Attack Analysis, World Wide War, US Navy, United States of America, Threat Intelligence, Red Team

'I want you to be the Admiral Nagumo of my staff. I want your every thought, every instinct as you believe Admiral Nagumo might have them. You are to see the war, their operations, their aims, from the Japanese viewpoint and keep me advised what you are thinking about, what you are doing, and what purpose, what strategy, motivates your operations. If you can do this, you will give me the kind of information needed to win this war.' - Edwin Layton, RADM USN, 'And I Was There', 1985, pg.357, ISBN-13: 978-5550460245, Publisher - Random House (March 1987)

Brought to my undeniably over-taxed attention by the Red Team Journal

December 14, 2015 /Marc Handelman
All is Information, Alternate Attack Analysis, World Wide War, US Navy, United States of America, Threat Intelligence, Red Team
  • Newer
  • Older