It seems to be a significant buzzword nowadays, but Threat Intelligence is available in an abundance from a wide range of curators and commercial suppliers.

So what does it take to correlate observables such as precursors to determine if they are an indicator of compromise, and by whom have they been generated?

This post will talk briefly of the efforts I am investing into a final project for a Master degree in Information Systems Security through Charles Sturt University.

The topic broadly, aims to describe how Open Source Intelligence can inform a Security Analyst of external threats, and how that information may be used to better inform the business of it’s threat landscape.

If you are interested in seeing the progress on this project, I have a dedicated blog for this purpose.

Head over to ITC571McHugh.WordPress.com and follow it to get the updates.

Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out /  Change )

Google photo

You are commenting using your Google account. Log Out /  Change )

Twitter picture

You are commenting using your Twitter account. Log Out /  Change )

Facebook photo

You are commenting using your Facebook account. Log Out /  Change )

Connecting to %s

This site uses Akismet to reduce spam. Learn how your comment data is processed.