GJProject Phoenix: 72 uur onder begeleiding van Unbreakable AcademyUitgebreide recap, specifiek geschreven voor mensen dit type trainingen overwegen of ‘leiders’ op zoek naar wat anders.Apr 21, 2023Apr 21, 2023
GJDealing with ChatGPT-generated hype and anxietyThis blog addresses the anxiety generated about language models in cyber attacks, by placing it within the context of a cyber attack chain.Feb 17, 2023Feb 17, 2023
GJReimagining Your Intelligence DeliverableIn this short article, we explore telling better stories to engage stakeholders in a more effective manner to address CTI challenges.Feb 3, 2023Feb 3, 2023
GJNeed your own ‘threat landscape’ methodology?Do you need a good workflow to build your own ‘cyber threat landscape’? ENISA just published theirs!Jul 8, 2022Jul 8, 2022
GJ5 Steps to Start Using Forecasting Techniques to Anticipate Cyber ThreatsWant to forecast cyber threats ? Here’s five steps to get you started.Apr 14, 2022Apr 14, 2022
GJGlance a 100-page (security) report in under a minuteEver wanted to skim lengthy (security) reports to quickly explore the essence? In this article I will share one method to do this yourself!Mar 26, 2021Mar 26, 2021
GJinFalconForce3 tips to secure your companies digital footprint with limited budgetThis blog post shares useful tips for understanding and securing your companies digital presence. Aimed at both leadership and operations…Aug 11, 2020Aug 11, 2020
GJinFalconForceDealing with new vulnerabilitiesThis blog post is the first part of a two-part series, sharing practical tips on dealing with large volumes of information on…Jul 10, 2020Jul 10, 2020