In this article, which is a starting point in our cybersecurity journey, we will focus on Cyber Threat Actors, on how we can group them, what is their motivation, who is their target and how you can perform threat profiling to map those who apply to you or your company.
I do believe that for the beginning will be a better approach to understand who your adversaries are instead of jumping right into solutions for specific problems.
This is an important step because you can go deeper and identify for whom you are the target, what tactics/techniques they use, what…
In this article, I would like to explain what are the main purposes and reasons for the existence of the Defensive Network. As this will be a long journey I would appreciate any support and feedback from anyone with whom this will resonate.
As you might realize, the primary topic will be cybersecurity, but cybersecurity is directly connected to and dependent on many other areas, like availability, scalability, effectiveness, automation, continuous improvement, and testing, to name a few.
“Efficiency is doing things right and effectiveness is doing the right things.”
— Peter Drucker
In my career which has taken me…
Publication aiming to provide essential information to build an adaptive cyber defense ecosystem