Cyber Threat Intelligence (CTI) – Part 1

In today’s dynamic threat environment, CISO’s and their security programs often find themselves triaging a breach after the attack, analyzing digital artifacts as they try to piece together an event that happened in the past. Hopefully, the information they glean from the files, logs, and recovered data provides enough information to remediate any discovered security gaps and provide intelligence on possible future events.

Read full news article on