Robuta

https://feedly.com/ti-essentials/posts/conference-call-for-proposals-strategies-that-help-me-tackle-cfps
Apr 14, 2025
conference callproposalsstrategieshelptackle
https://feedly.com/ti-essentials/posts/three-core-characteristics-of-high-quality-cyber-threat-intelligence
Oct 29, 2025
cyber threat intelligencehigh qualitythreecorecharacteristics
https://feedly.com/ti-essentials/posts/how-to-fuse-cti-with-threat-hunting
Dec 4, 2025
threat huntingpractical guideintegrate
https://feedly.com/ti-essentials/posts/stop-reinventing-the-cti-wheel-why-cyber-intelligence-needs-to-get-back-to-project-management
Nov 13, 2025
project managementti essentialsctiapplyingagile
https://feedly.com/ti-essentials/posts/lessons-from-the-trick-or-breach-webinar
Nov 11, 2025
horror storiesti essentialsctianalystsfeedly
https://feedly.com/ti-essentials/posts/frequent-social-engineering-vishing-attack-scenarios
Feb 7, 2023 - Social engineering vishing scams have been on the rise during the past couple of years making it crucial to employ strong and strategic defense mechanisms.
social engineeringti essentialsfrequentvishingattack
https://feedly.com/ti-essentials/posts/harnessing-osint-for-threat-intelligence-collection
Mar 20, 2025 - Open-source intelligence (OSINT) is freely available, but is it trustworthy? Alessandro discusses collecting and transforming OSINT into actionable intel.
ti essentialsintroductionleveragingosintcollection
https://feedly.com/ti-essentials/posts/how-can-you-use-attack-surface-intelligence-to-reduce-your-organizational-risk-profile
Jan 15, 2026
attack surfaceproactive riskintelligencereductionessentials
https://feedly.com/ti-essentials/posts/how-to-operationalize-the-cti-cmm-a-practical-guide
Jan 8, 2026 - A step-by-step guide to go from assessment to action in 60 days using the CTI-CMM, increasing your CTI program's value
usecticmmday
https://feedly.com/ti-essentials/posts/components-to-include-in-your-threat-intel-brief
Mar 24, 2022 - Threat intelligence briefs help your team understand security trends and reduce exposure of your business. Here, we'll discuss five components of a good...
threat intelcriticalcomponentsincludenext
https://feedly.com/ti-essentials/posts/making-proactive-threat-intelligence-sustainable-in-a-post-covid-world
Mar 11, 2022 - COVID-19 put cybercrime into overdrive. Now more than ever, a reactive cybersecurity strategy is inadequate and organisations need a proactive approach.
threat intelligencemakingproactivesustainablepost
https://feedly.com/ti-essentials/posts/how-to-use-priority-intelligence-requirements
Oct 16, 2023 - Priority intelligence requirements (PIRs) help cyber threat intelligence teams align their work with the organization's needs. Downloadable PIR worksheet
ti essentialsusecybersecuritypriorityintelligence
https://feedly.com/ti-essentials/posts/creating-a-threat-model-turning-theory-into-practice
Aug 29, 2024
threat modelti essentialscreatingturningtheory
https://feedly.com/ti-essentials/posts/top-5-tips-for-operationalizing-cti-insights-from-feedly-experts
May 8, 2025
ti essentialstoptipsctifeedly
https://feedly.com/ti-essentials/posts/beyond-third-parties-cti-s-role-in-mitigating-supply-chain-risk
Jun 19, 2025
supply chain riskthird partiesbeyondrolemitigating
https://feedly.com/ti-essentials/posts/beyond-queries-ai-prompting-techniques-for-cti-analysts
Oct 2, 2025 - Practical techniques for prompting to improve AI outputs for cybersecurity work.
ti essentialsbeyondqueriesaiprompting
https://feedly.com/ti-essentials/posts/the-future-of-cybersecurity-doesnt-lie-in-technology
Apr 12, 2022 - Cybersecurity tends to emphasize technical skills, but with changing tactics and a significant hiring gap, an emphasis on non-technical skills is needed.
ti essentialsfuturecybersecuritylietechnology
https://feedly.com/ti-essentials/posts/monitoring-geopolitical-risk-strategies-and-resources-for-the-private-sector-intelligence
May 30, 2024
monitoringgeopoliticalriskstrategiesresources
https://feedly.com/ti-essentials
Expert advice by and for Cyber Threat Intelligence professionals with a focus on open source intelligence and threat hunting. Become a contributor.
feedly threat intelligenceti essentialsbest practicespros
https://feedly.com/ti-essentials/posts/everyday-risk-rating
Mar 22, 2022 - Security people are sensitive to risks in the world. I’m not arguing what is too much, but that the calculations should be based on some sort of analysis.
ti essentialseverydayriskratingfeedly
https://feedly.com/ti-essentials/posts/how-to-go-from-good-to-great-intelligence-leadership
Nov 20, 2025 - Practical guidance for building lasting intelligence systems, mastering lateral communication, and developing future leaders
goodgreatleadershipguideintelligence
https://feedly.com/ti-essentials/posts/how-to-objectively-compare-sources-for-threat-intelligence-reports
Mar 11, 2022 - Each of your reports should be labeled indicating how much you trust the information that you are providing. Here's a method for rating those sources.
threat intelligencecomparesourcesreportsti
https://feedly.com/ti-essentials/posts/how-to-use-visuals-effectively-in-cti
Jan 23, 2026
threat intelligenceti essentialsvisualsimprovereporting
https://feedly.com/ti-essentials/posts/cti-career-roadmap-navigating-your-path-from-analyst-to-leader
Jan 22, 2026
cticareerroadmapladdervs
https://feedly.com/ti-essentials/posts/asset-mapping
Oct 9, 2025
threat modelingtackledifficultstep
https://feedly.com/ti-essentials/posts/from-malicious-packages-to-actionable-intelligence-with-opensourcemalware
Dec 18, 2025 - How CTI teams can extract IoCs from software supply chain attacks that traditional tools miss
threat intelligenceti essentialsextractmaliciouspackages
https://feedly.com/ti-essentials/posts/how-to-pitch-cti-to-leaders-a-new-approach-to-cti-business-cases
Feb 12, 2026
business casectiguidethreatsdecision
https://feedly.com/ti-essentials/posts/deep-dive-on-feedly-s-pir-blueprint-and-how-to-operationalize-it
Dec 12, 2023 - A closer look at each section of the Feedly PIR Blueprint and how to use this free resource.
deep diveblueprint
https://feedly.com/ti-essentials/posts/how-to-use-threat-intelligence-to-form-a-stronger-purple-team
Mar 11, 2022 - If you’re doing purple team exercises, threat intelligence is one way to help set up real-world scenarios for your team. This way, you can build real TTPs.
threat intelligenceuseformstrongerpurple
https://feedly.com/ti-essentials/posts/practical-guidance-for-dora-compliance-using-feedly
Jun 26, 2025
practical guidancedora complianceusingfeedlyessentials
https://feedly.com/ti-essentials/posts/defining-osint-and-its-role-in-cyber-threat-intelligence
Mar 8, 2022 - Open Source Intelligence refers to all data publicly available for exploitation. It is widely used in threat intelligence to detect and counter cyber attacks.
cyber threat intelligencedefiningosintroleti
https://feedly.com/ti-essentials/posts/how-to-use-mitre-attck-for-threat-intelligence
Apr 12, 2022 - Using ATT&CK for CTI provides a way of analyzing adversarial capabilities and how threat actors accomplish their goals in the cyber domain.
threat intelligenceusemitreattamp
https://feedly.com/ti-essentials/posts/essential-guide-to-developing-an-effective-cyber-threat-model
Aug 22, 2024
essential guidethreat modeldevelopingeffectivecyber
https://feedly.com/ti-essentials/posts/using-osint-to-observe-the-next-attack-on-your-network
Apr 5, 2022 - How can we use open-source Intelligence to review attack surfaces? We can scan for the “external picture” to gain a better understanding.
usingosintobservenextattack