Lucerito LopezWeek 5 Blog Post — Threat ModelingThreat modeling is the process of identifying and communicating information about threats that could impact a specific network or system…Dec 7, 2022Dec 7, 2022
Lucerito LopezWeek 4 Blog Post — CTI SharingCyber Threat Intelligence Sharing is the process of exchanging cyber threat information, within a sharing community, to enable…Dec 7, 2022Dec 7, 2022
Lucerito LopezWeek 3 Blog Post — MITRE FrameworksMITRE ATT&CK is defined as a framework (set of data matrices) and assessment tool used to help organizations expose vulnerabilities in…Dec 7, 2022Dec 7, 2022
Lucerito LopezWeek 2 Blog Post — CTI in the SOCCyber threat intelligence plays a key role for any Security Operation Center (SOC). SOC operators are able to utilize cyber threat…Nov 11, 2022Nov 11, 2022
Lucerito LopezWeek 1 Blog Post — Cyberthreat IntelligenceCyber threat intelligence is defined by Bautista as “an analysis of an adversary’s intent, opportunity, and capability to do harm” (2018)…Nov 9, 2022Nov 9, 2022