https://feedly.com/ti-essentials/posts/frequent-social-engineering-vishing-attack-scenarios
Feb 7, 2023 - Social engineering vishing scams have been on the rise during the past couple of years making it crucial to employ strong and strategic defense mechanisms.
social engineeringti essentialsfrequentvishingattack
https://feedly.com/ti-essentials/posts/harnessing-osint-for-threat-intelligence-collection
Mar 20, 2025 - Open-source intelligence (OSINT) is freely available, but is it trustworthy? Alessandro discusses collecting and transforming OSINT into actionable intel.
ti essentialsintroductionleveragingosintcollection
https://feedly.com/ti-essentials/posts/how-to-operationalize-the-cti-cmm-a-practical-guide
Jan 8, 2026 - A step-by-step guide to go from assessment to action in 60 days using the CTI-CMM, increasing your CTI program's value
usecticmmday
https://feedly.com/ti-essentials/posts/components-to-include-in-your-threat-intel-brief
Mar 24, 2022 - Threat intelligence briefs help your team understand security trends and reduce exposure of your business. Here, we'll discuss five components of a good...
threat intelcriticalcomponentsincludenext
https://feedly.com/ti-essentials/posts/making-proactive-threat-intelligence-sustainable-in-a-post-covid-world
Mar 11, 2022 - COVID-19 put cybercrime into overdrive. Now more than ever, a reactive cybersecurity strategy is inadequate and organisations need a proactive approach.
threat intelligencemakingproactivesustainablepost
https://feedly.com/ti-essentials/posts/how-to-use-priority-intelligence-requirements
Oct 16, 2023 - Priority intelligence requirements (PIRs) help cyber threat intelligence teams align their work with the organization's needs. Downloadable PIR worksheet
ti essentialsusecybersecuritypriorityintelligence
https://feedly.com/ti-essentials/posts/top-5-tips-for-operationalizing-cti-insights-from-feedly-experts
May 8, 2025
ti essentialstoptipsctifeedly
https://feedly.com/ti-essentials/posts/beyond-queries-ai-prompting-techniques-for-cti-analysts
Oct 2, 2025 - Practical techniques for prompting to improve AI outputs for cybersecurity work.
ti essentialsbeyondqueriesaiprompting
https://feedly.com/ti-essentials/posts/the-future-of-cybersecurity-doesnt-lie-in-technology
Apr 12, 2022 - Cybersecurity tends to emphasize technical skills, but with changing tactics and a significant hiring gap, an emphasis on non-technical skills is needed.
ti essentialsfuturecybersecuritylietechnology
https://feedly.com/ti-essentials/posts/everyday-risk-rating
Mar 22, 2022 - Security people are sensitive to risks in the world. I’m not arguing what is too much, but that the calculations should be based on some sort of analysis.
ti essentialseverydayriskratingfeedly
https://feedly.com/ti-essentials/posts/how-to-go-from-good-to-great-intelligence-leadership
Nov 20, 2025 - Practical guidance for building lasting intelligence systems, mastering lateral communication, and developing future leaders
goodgreatleadershipguideintelligence
https://feedly.com/ti-essentials/posts/how-to-objectively-compare-sources-for-threat-intelligence-reports
Mar 11, 2022 - Each of your reports should be labeled indicating how much you trust the information that you are providing. Here's a method for rating those sources.
threat intelligencecomparesourcesreportsti
https://feedly.com/ti-essentials/posts/cti-career-roadmap-navigating-your-path-from-analyst-to-leader
Jan 22, 2026
cticareerroadmapladdervs
https://feedly.com/ti-essentials/posts/deep-dive-on-feedly-s-pir-blueprint-and-how-to-operationalize-it
Dec 12, 2023 - A closer look at each section of the Feedly PIR Blueprint and how to use this free resource.
deep diveblueprint
https://feedly.com/ti-essentials/posts/how-to-use-threat-intelligence-to-form-a-stronger-purple-team
Mar 11, 2022 - If you’re doing purple team exercises, threat intelligence is one way to help set up real-world scenarios for your team. This way, you can build real TTPs.
threat intelligenceuseformstrongerpurple
https://feedly.com/ti-essentials/posts/defining-osint-and-its-role-in-cyber-threat-intelligence
Mar 8, 2022 - Open Source Intelligence refers to all data publicly available for exploitation. It is widely used in threat intelligence to detect and counter cyber attacks.
cyber threat intelligencedefiningosintroleti
https://feedly.com/ti-essentials/posts/how-to-use-mitre-attck-for-threat-intelligence
Apr 12, 2022 - Using ATT&CK for CTI provides a way of analyzing adversarial capabilities and how threat actors accomplish their goals in the cyber domain.
threat intelligenceusemitreattamp
https://feedly.com/ti-essentials/posts/using-osint-to-observe-the-next-attack-on-your-network
Apr 5, 2022 - How can we use open-source Intelligence to review attack surfaces? We can scan for the “external picture” to gain a better understanding.
usingosintobservenextattack