Sign in

Cyber Defense Network (Defensive.Network)
Publication aiming to provide essential information to build an adaptive cyber defense ecosystem
Photo by Alvaro Reyes on Unsplash

In this article, which is a starting point in our cybersecurity journey, we will focus on Cyber Threat Actors, on how we can group them, what is their motivation, who is their target and how you can perform threat profiling to map those who apply to you or your company.

I do believe that for the beginning will be a better approach to understand who your adversaries are instead of jumping right into solutions for specific problems.

This is an important step because you can go deeper and identify for whom you are the target, what tactics/techniques they use, what…


In this article, I would like to explain what are the main purposes and reasons for the existence of the Defensive Network. As this will be a long journey I would appreciate any support and feedback from anyone with whom this will resonate.

As you might realize, the primary topic will be cybersecurity, but cybersecurity is directly connected to and dependent on many other areas, like availability, scalability, effectiveness, automation, continuous improvement, and testing, to name a few.

“Efficiency is doing things right and effectiveness is doing the right things.”
— Peter Drucker

In my career which has taken me…

Cyber Defense Network (Defensive.Network)

Publication aiming to provide essential information to build an adaptive cyber defense ecosystem

Get the Medium app

A button that says 'Download on the App Store', and if clicked it will lead you to the iOS App store
A button that says 'Get it on, Google Play', and if clicked it will lead you to the Google Play store