David and Matthew have talked poorly about Threat Intel for years now. It's only fair to give Threat Intel it's own time in the sun, and let it shine. TI is represented today by Victor!
Supporting Links:
The Cybersecurity “EASY” Button: A Framework for Security Programs
JP 2-0, Joint Intelligence Publication
STIX 2.1 Specification
Excel-ing at Threat Intelligence Platform (TIP) Requirements
If you found this interesting or useful, please follow us on Twitter @serengetisec and subscribe and review on your favorite podcast app!
In this episode we discuss securing Low- and No-Code development, hackers who plant evidence of crimes, US Justice Department announcing it will attack hackers...
This week we discuss the Mt. Gox hack, 9 years on, due to the recent charging, we discuss how sextortion is changing with the...
Back from summer break baby! WARNING - There is a spicy joke to open up the episode. I went back and forth on bleeping...