Threat Intelligence Essentials

Best Practices for CTI Pros

Articles written by and for threat intelligence professionals

MITRE ATT&CK

Introduction to MITRE ATT&CK - Featuring Version 15 (2024)

Social Engineering

How artificial intelligence impacts the present and future of social engineering attacks

Social Engineering

Avoiding Analysis Paralysis

PIRs

Translate your PIRs into AI Feeds

PIRs

Deep dive on Feedly’s PIR blueprint and how to operationalize it

PIRs

How to conduct stakeholder interviews to set Priority Intelligence Requirements (PIRs)

PIRs

How to use Priority Intelligence Requirements (PIRs) with Feedly

Social Engineering

Frequent social engineering vishing attack scenarios

Social Engineering

Social engineering kill–chain: Predicting, minimizing & disrupting attack verticals

Social Engineering

High value targets: Where should you focus your intelligence collection & analysis efforts?

MITRE ATT&CK

How to Use MITRE ATT&CK for Threat Intelligence

Threat Intelligence

The future of cybersecurity doesn’t lie in technology

Best Practices

Using OSINT to Observe the Next Attack on Your Network

Best Practices

5 Critical Components to Include in Your Next Threat Intel Brief

Best Practices

Everyday Risk Rating

Best Practices

How to Objectively Compare Sources for Threat Intelligence Reports

Best Practices

How to Use Threat Intelligence to Form a Stronger Purple Team

Best Practices

Making Proactive Threat Intelligence Sustainable in a Post-COVID World

Threat Intelligence

Defining OSINT and Its Role in Cyber Threat Intelligence

Contributors

Guillaume Alliel
Founder, CEO Phinasoft
Daniel Miessler
Host of Unsupervised Learning
Chris Pickard
Cyber Security Customer Success Manager at Feedly
Mars Groves
Cybersecurity Analyst, Writer
View All Contributors