Fall 2017 Meetings
The information sharing communities of Europe and the United States will both be converging during two separate and concurrent meetings in Rome,…
The information sharing communities of Europe and the United States will both be converging during two separate and concurrent meetings in Rome,…
In a recent article published on Tripwire by CTIN co-founder Jane Ginn compared the original battle of Marathon in Greece with the…
CTIN and partner EclecticIQ have joined together to provide training programs for threat intelligence hunting. The shortage of trained threat intelligence hunters…
In Part 1, I asserted that the reverse market forces at play in the cyber landscape (i.e., unchecked monetization of cybercrime) would…
Photos from Africa that portray animals on the hunt for prey. The new cadre of cybersecurity professionals are gaining these skills. Why?…
By: Jane Ginn, MSIA, MRP February, 2015 It has been two months since the passing of the late Martin Dipo Zimmermann, my…
Botnets are an insidious fact of the modern Internet. Botnets are groups of computers from all around the world that have been…
H.R. 624 is currently being considered by Congress for enhancing Cybersecurity Intelligence Sharing. The bill passed the House April 18, 2013, and…
Threat actors harvest email addresses, identification numbers, user name/password combinations, credit card information, health information and other personally identifiable information for nefarious…
Small and medium-sized enterprises in the DOD supply chain have some work cut out for them to come into compliance with recent…