Blog Archive

Reel of words showing fake news theme
Intelligence
RJG

Sandworm: Shadows in the Code

The film takes you on a journey through the intricate web of election interference and digital espionage, exploring the tactics, techniques, and procedures employed by this elusive group. It sheds light on the geopolitical implications of cyber warfare and raises pressing questions about security, sovereignty, and the future of conflict in the digital age.

Read More »
Devastated city
Intelligence
Niels Groenveld

Al-Qaeda’s Persistent Global Menace: Analyzing Recent Developments

Over the past month, various developments have highlighted the enduring influence of Al-Qaeda and the complex global challenge it poses. This column examines the intricate dynamics of Al-Qaeda’s operations, their strategic shifts, regional expansions, and the multifaceted efforts required to counter this persistent threat.

Read More »

Alphabetical Archive

PART 1: Existential Cyber Threats and the Risk of a Destabilized World
PART 1: Existential Cyber Threats and the Risk of a Destabilized World
Doug DePeppe
A New Age of Data Rights Enforcement
A New Age of Data Rights Enforcement
Doug DePeppe
A Pilot Program for Critical Infrastructure
A Pilot Program for Critical Infrastructure
RJG
A Preemptive Executive Order: Cybersecurity
A Preemptive Executive Order: Cybersecurity
RJG
A Question for You, John Galt: Where is the CTI Blockchain?
A Question for You, John Galt: Where is the CTI Blockchain?
RJG
A TIP for a Blockchain Community
A TIP for a Blockchain Community
RJG
ACTA vs. the Open Source Credo
ACTA vs. the Open Source Credo
RJG
Advances in Technology and Protection of the Rights of the Accused
Advances in Technology and Protection of the Rights of the Accused
RJG
Aggregator
Aggregator
RJG
AI Tools for Cybersecurity
AI Tools for Cybersecurity
RJG
Al-Qaeda’s Persistent Global Menace: Analyzing Recent Developments
Al-Qaeda’s Persistent Global Menace: Analyzing Recent Developments
Niels Groenveld
Android Phones of Ukranian Soldiers Weaponized by GRU
Android Phones of Ukranian Soldiers Weaponized by GRU
Niels Groenveld
Behind Enemy Lines: Inside the Operations of Russia’s Elite Cyber Espionage Units
Behind Enemy Lines: Inside the Operations of Russia’s Elite Cyber Espionage Units
Niels Groenveld
Beyond the Clouds: Safeguarding Our LEO Telecom Future from Cyber Sabotage
Beyond the Clouds: Safeguarding Our LEO Telecom Future from Cyber Sabotage
RJG
Borderless Cyber Conference Session
Borderless Cyber Conference Session
RJG
Botnet Terminator
Botnet Terminator
RJG
Charting a New Course for Military Cyber Threat Intelligence
Charting a New Course for Military Cyber Threat Intelligence
Niels Groenveld
Common Security Advisory Framework Finalized
Common Security Advisory Framework Finalized
RJG
Communications Acceptable Use Policies: Some Cybersecurity Considerations
Communications Acceptable Use Policies: Some Cybersecurity Considerations
RJG
Cyber Threat Analysis in Complex Adaptive Systems
Cyber Threat Analysis in Complex Adaptive Systems
RJG
Cybersecurity for Real Estate Agents
Cybersecurity for Real Estate Agents
RJG
Cybersecurity Intelligence Sharing: A Bill
Cybersecurity Intelligence Sharing: A Bill
RJG
DFARS Regulations Pushing Small Firms to Upgrade
DFARS Regulations Pushing Small Firms to Upgrade
RJG
Digital Deception: How Cybercriminals Prey on the Elderly
Digital Deception: How Cybercriminals Prey on the Elderly
RJG
Digital Memorial Tribute: Martin Zimmermann
Digital Memorial Tribute: Martin Zimmermann
RJG
Dragon’s Den Dispatches: Decoding China’s Policy Playbook
Dragon’s Den Dispatches: Decoding China’s Policy Playbook
Niels Groenveld
Election 2020 – Trolls are Ramping Up
Election 2020 – Trolls are Ramping Up
RJG
Energy Sector Standard: Public Review
Energy Sector Standard: Public Review
RJG
ENISA 2018 Threat Landscape Report Out
ENISA 2018 Threat Landscape Report Out
RJG
Eternal Life of Malware
Eternal Life of Malware
RJG
Expanding the Use Cases for STIX in Law Enforcement
Expanding the Use Cases for STIX in Law Enforcement
Niels Groenveld
Expanding the Use Cases of STIX and TAXII: National Security
Expanding the Use Cases of STIX and TAXII: National Security
Niels Groenveld
Final Published:  STIX2.1 & TAXII2.1
Final Published: STIX2.1 & TAXII2.1
RJG
From Ballots to Bank Accounts:  How Russia is Disrupting Western Democracies and Economies
From Ballots to Bank Accounts: How Russia is Disrupting Western Democracies and Economies
RJG
From Data to Defense: The Role of Knowledge Management in Cyber Threat Analysis
From Data to Defense: The Role of Knowledge Management in Cyber Threat Analysis
RJG
Guardians of the Digital Realm: The Crucial Role of Leadership in Cybersecurity
Guardians of the Digital Realm: The Crucial Role of Leadership in Cybersecurity
RJG
Hunting Maturity: Hunt as a Pack
Hunting Maturity: Hunt as a Pack
RJG
Incubator of Catastrophe
Incubator of Catastrophe
RJG
Interoperability Village
Interoperability Village
RJG
Iran’s Cyber Warfare: Analyzing the Impact of State-Sponsored Hacking on Global Security
Iran’s Cyber Warfare: Analyzing the Impact of State-Sponsored Hacking on Global Security
Niels Groenveld
Is it Worth it to do “Social Media”?
Is it Worth it to do “Social Media”?
RJG
JSON Abstract Data Notation Finalized
JSON Abstract Data Notation Finalized
RJG
Kimsuky Abusing DMARC Protocol
Kimsuky Abusing DMARC Protocol
RJG
Knigsfot: The Covert Cyber Assault on Global Infrastructure
Knigsfot: The Covert Cyber Assault on Global Infrastructure
RJG
Leveraging STIX for Human Trafficking Intel: Technical Analysis
Leveraging STIX for Human Trafficking Intel: Technical Analysis
Niels Groenveld
Liberty is Not Easy
Liberty is Not Easy
RJG
Major Tier 2 Route Leaks
Major Tier 2 Route Leaks
RJG
Moving STIX2.1 to ITU
Moving STIX2.1 to ITU
RJG
OASIS Advisor Elected to UN Economic Commission for Europe Specialist Team
OASIS Advisor Elected to UN Economic Commission for Europe Specialist Team
RJG
OASIS Open – New Board of Directors
OASIS Open – New Board of Directors
RJG
Online Self-Directed Training Modules: OSINT
Online Self-Directed Training Modules: OSINT
RJG
OpenC2 Architecture Specification
OpenC2 Architecture Specification
RJG
PART 2: Fix the Cyber Market Disfunction
PART 2: Fix the Cyber Market Disfunction
RJG
PART 3: A Third Sphere Model
PART 3: A Third Sphere Model
Doug DePeppe
Physical Security for Commercial Facilities
Physical Security for Commercial Facilities
RJG
Potential New EvilNum Campaign
Potential New EvilNum Campaign
RJG
Pyongyang’s Playbook: Insider Insights into North Korea’s Military Doctrine
Pyongyang’s Playbook: Insider Insights into North Korea’s Military Doctrine
Niels Groenveld
Reprint: The New “Hot” War in Geopolitics
Reprint: The New “Hot” War in Geopolitics
RJG
Sandworm: Shadows in the Code
Sandworm: Shadows in the Code
RJG
Secure QR Code Standard Published
Secure QR Code Standard Published
RJG
Security Best Practices for Commercial Facilities
Security Best Practices for Commercial Facilities
RJG
Security Standards Council: New QIR Training
Security Standards Council: New QIR Training
RJG
So You Want To Set-up an ISAC
So You Want To Set-up an ISAC
RJG
Social Media and Data Integrity
Social Media and Data Integrity
RJG
Social Media Misinformation Campaigns
Social Media Misinformation Campaigns
RJG
Social Media Network Harvesting: Some considerations
Social Media Network Harvesting: Some considerations
RJG
Some Case Law on the Use of Social Media
Some Case Law on the Use of Social Media
RJG
STIX 2.0 & TAXII 2.0 Finalized & Published
STIX 2.0 & TAXII 2.0 Finalized & Published
RJG
STIX Patterning Reference Guide
STIX Patterning Reference Guide
RJG
STIX2.1 Best Practices
STIX2.1 Best Practices
RJG
STIX2.1 Overview
STIX2.1 Overview
RJG
TAXII-Worker Tool Now Available
TAXII-Worker Tool Now Available
RJG
The “Mill Taste” Campaign
The “Mill Taste” Campaign
RJG
The 2017 International Information Sharing Conference in Rome
The 2017 International Information Sharing Conference in Rome
RJG
The Art of Believable, but Wrong Narratives in Chinese Propaganda Campaigns
The Art of Believable, but Wrong Narratives in Chinese Propaganda Campaigns
RJG
The Cyber Cold War: Separating Fact from Fiction in US-China Cyber Relations
The Cyber Cold War: Separating Fact from Fiction in US-China Cyber Relations
RJG
The Evolution of Generative AI: Insights from Stanford’s 2024 AI Index
The Evolution of Generative AI: Insights from Stanford’s 2024 AI Index
RJG
The Good, Bad & Ugly of Cyber Security
The Good, Bad & Ugly of Cyber Security
RJG
The Invisible Front: How Iran is Redefining Warfare in the Digital Age
The Invisible Front: How Iran is Redefining Warfare in the Digital Age
RJG
The Key to Success for the Cybersecurity Framework
The Key to Success for the Cybersecurity Framework
RJG
The Power of Collaboration: How We’re Shaping the Future of Cybersecurity Together
The Power of Collaboration: How We’re Shaping the Future of Cybersecurity Together
RJG
The Role of STIX in Strengthening Cyber Threat Intelligence within ISAOs
The Role of STIX in Strengthening Cyber Threat Intelligence within ISAOs
RJG
The Run For Technological Advantage
The Run For Technological Advantage
RJG
The U.S. Government’s Top Priority for 2013; Or, it should be…
The U.S. Government’s Top Priority for 2013; Or, it should be…
RJG
Threat Hunting with The Hive, Cortex and MISP
Threat Hunting with The Hive, Cortex and MISP
Niels Groenveld
Tools for Analyzing Threats to a WordPress Website
Tools for Analyzing Threats to a WordPress Website
RJG
Tragedy of the Cyberspace Commons
Tragedy of the Cyberspace Commons
RJG
Using a TIP for a Training Program
Using a TIP for a Training Program
RJG
What to Watch For in 2024 Q3 & Q4
What to Watch For in 2024 Q3 & Q4
RJG
Why Use STIX2.1 In Your Products
Why Use STIX2.1 In Your Products
RJG
Translate »