Ondra RojčíkWhy a Non-Technical Background Does Not Prevent You from Succeeding in Cyber Threat IntelligenceIntrusions, cyber attacks and adversarial operations are often seen as technical events best described by the deployed malware, leveraged…May 273May 273
Ondra RojčíkCommunicating Uncertainties: A Guide to Estimative Language and Confidence Levels in CTI ReportingIntelligence analysis is a word of uncertainties. Although we have established tools to overcome them, even reputable Cyber Threat…Dec 12, 2023Dec 12, 2023
Ondra RojčíkDeveloping Priority Intelligence Requirements for your Cyber Threat Intelligence ProgramIn the rapidly evolving landscape of cyber threat intelligence (CTI), the formulation of Priority Intelligence Requirements (PIRs) stands…Dec 5, 2023Dec 5, 2023
Ondra RojčíkFrom Descriptions to Impact: Unlocking the Power of Basic Cyber Threat Intelligence QuestionsA common shortcoming of CTI reports is the tendency to admire the problem instead of delivering explanations, implications, and mitigation…Jun 12, 2023Jun 12, 2023
Ondra RojčíkDefining the intelligence requirements — what does the CTI community know about the process?Below is a literature review of resources that inspired the Red Hat Priority Intelligence Requirements (PIRs) development process. Please…Feb 13, 2023Feb 13, 2023