cyber defence operations

Jan
09
The Threat Hunting Shift. Part 4: Adversarial Framework for Tactical Cyber Defense Operations II

The Threat Hunting Shift. Part 4: Adversarial Framework for Tactical Cyber Defense Operations II

Continuing from Threat Hunting Shift Part 3, we will now introduce the Defend and Design domains. So without further ado,
7 min read
Oct
20
The Threat Hunting Shift. Part 2: The Way of the Intercepting Fist II

The Threat Hunting Shift. Part 2: The Way of the Intercepting Fist II

We discuss Active Defense, moving beyond a passive approach to detection. How can we intentionally shape threat actor behavior via Controlled Attack Paths and Cyber Deception? Defenders inadvertently influence attackers by the way they configure layered defenses, impacting attack preferences.
10 min read
Oct
09
The Threat Hunting Shift. Part 1: The Way of the Intercepting Fist I

The Threat Hunting Shift. Part 1: The Way of the Intercepting Fist I

While Threat Hunting is commonly seen as proactive threat detection, we propose a broader approach through the lens of Active Defense. This involves intercepting and disrupting adversaries with the goal of actively shaping attacker behavior rather than relying solely on detection.
8 min read