The Cyber Threat Intelligence Analyst – Speaking Your Languge

One issue that is raised frequently is the way in which security or IT teams struggle to speak the “business language” to members of the senior leadership that take the final decisions on spending and investment. This problem could have its roots in IT – and later security – teams historically having their management lines …

The Cyber Threat Intelligence Analyst – Speaking Your Languge Read More »

Special delivery: common malware propagation methods

In this post, we hope to demystify some of the most common malware delivery methods that modern threat actors use to deliver their malicious payloads. Understanding how these methods work is essential to spotting malicious activity in your organisation and potentially saving both money and time spent on recovery. This is by no means an …

Special delivery: common malware propagation methods Read More »

Scroll to Top