Dr. Walid SoulaA Quantitative Approach to Porter’s Diamond ModelExplore Porter’s Diamond Model, its pros and cons, and how it analyzes industry competitiveness and market dynamics.Oct 14
jcm3Diamond Model | TryHackMe — WalkthroughHey all, this is the fourth installment in my walkthrough series on TryHackMe’s SOC Level 1 path and the fourth room in this module on…Feb 12
Efstratios LontzetidisCyber Threat Intelligence Lifecycle: Answering the CTI Analyst ChallengeIn this blog we analyze the Cyber Threat Intelligence — CTI Lifecycle, by performing intelligence analysis in a reactive scenario.Jun 18Jun 18
Alex Worapol PongpechA Robust Company’s AI Strategy using Porter’s Diamond ModelPorter’s Diamond ModelMay 15May 15
Dr. Walid SoulaA Quantitative Approach to Porter’s Diamond ModelExplore Porter’s Diamond Model, its pros and cons, and how it analyzes industry competitiveness and market dynamics.Oct 14
jcm3Diamond Model | TryHackMe — WalkthroughHey all, this is the fourth installment in my walkthrough series on TryHackMe’s SOC Level 1 path and the fourth room in this module on…Feb 12
Efstratios LontzetidisCyber Threat Intelligence Lifecycle: Answering the CTI Analyst ChallengeIn this blog we analyze the Cyber Threat Intelligence — CTI Lifecycle, by performing intelligence analysis in a reactive scenario.Jun 18
Alex Worapol PongpechA Robust Company’s AI Strategy using Porter’s Diamond ModelPorter’s Diamond ModelMay 15
Seth ThompsonInvestigative FrameworksWith so much data being available to modern investigators, one of the biggest challenges we face is figuring out which pieces of…Jan 21
InInfoSec Write-upsbyAdam GossThe Diamond Model: Simple Intelligence-Driven Intrusion AnalysisElevate your cyber threat intelligence analysis with the Diamond Model. This full guide will teach you everything to start.Apr 15
HaircutfishTryHackMe Diamond Model RoomLearn about the four core features of the Diamond Model of Intrusion Analysis: adversary, infrastructure, capability, and victim.Nov 30, 2022