Cyber Threat Actors — mapping your adversary

Photo by Alvaro Reyes on Unsplash

In this article, which is a starting point in our cybersecurity journey, we will focus on Cyber Threat Actors, on how we can group them, what is their motivation, who is their target and how you can perform threat profiling to map those who apply to you or your company.

I do believe that for the beginning will be a better approach to understand who your adversaries are instead of…




Building an adaptive cyber defense ecosystem together. Seamless to users, effective for companies of any size.

Recommended from Medium

60days of my CEH experience

The Cyber Branch of US Mil

{UPDATE} Mystery Trackers: Paxton Creek Avengers - A Mystery Hidden Object Game Hack Free Resources…

Threat Modeling is So Fetch


{UPDATE} Tendencias colegio de niñas juego Hack Free Resources Generator

{UPDATE} Learning Different Alphabets Hack Free Resources Generator

InfoSec Compliance & Certification — Medullan’s Journey Towards Success

Get the Medium app

A button that says 'Download on the App Store', and if clicked it will lead you to the iOS App store
A button that says 'Get it on, Google Play', and if clicked it will lead you to the Google Play store
Martin Holovský

Martin Holovský

cybersecurity architect - interested in innovative technologies, bio/brain hacking, transhumanism, cyberpunk, blockchain, and deep learning. (Defensive.Network)

More from Medium

Modern Technology Exploits and Analysis

“Intelligence-Driven Incident Response” Notes

Tidal Cyber — What is Threat Informed Defense?

Test Your Cybersecurity Defence Against ATT&CK Attacks with Center of Internet Security(CIS) CDM…