A Pilot Program for Critical Infrastructure
The U.S. Cybersecurity and Infrastructure Security Agency’s (CISA) announcement of a pilot program to deliver cybersecurity shared services to critical…
Hunting Maturity: Hunt as a Pack
One of the key benefits of participating in an Information Sharing and Analysis Organization (ISAO) is the benefit of resource…
Potential New EvilNum Campaign
CTIN has discovered a new campaign that appears to be associated with previous malicious infrastructure attributed to Evilnum. EvilNum is…
Charting a New Course for Military Cyber Threat Intelligence through Structured Standards and Protocols
The rapid advancements in cyber capabilities among nation-states and non-state actors alike have made the cyber domain a principal battleground,…
Android Phones of Ukranian Soldiers Weaponized by GRU
In a striking revelation that underscores the escalating tensions between Russia and Ukraine, a coalition of Western intelligence agencies has…
Physical Security for Commercial Facilities
Last month I wrote about cybersecurity for the Commercial Facilities critical infrastructure sector. Physical security is an essential aspect of…
So You Want To Set-up an ISAC
Setting up an Information Sharing and Analysis Center (ISAC) is essential for organizations aiming to create a comprehensive and strategic…
Liberty is Not Easy
What wisdom can you find that is greater than kindness? - Jean-Jacques Rousseau (1712-1778)
Security Best Practices for Commercial Facilities
Property managers of commercial facilities like shopping centers, sports stadiums, casinos, churches, and movie complexes face unique physical security and…
Why Use STIX2.1 In Your Products
The STIX2.1 data model is an important tool for developers of software in the cyber threat intelligence area because it…