From Intel to Impact

From Intel to Impact

What if your cybersecurity data pipeline functioned like a Git repository, with each team acting as a branch, merging their insights and actions into a "main" pipeline to drive real-world impact? Join me on this "Git-inspired" approach to scalable cyber operations.
🔮R1D3 Threat Driven Research Pipeline - Part 1

🔮R1D3 Threat Driven Research Pipeline - Part 1

In my last post I introduced the RIDE (R1D3) Framework for Active Defence. I outlined there the four basic phases of an active defence pipeline: Research, Discovery, Disruption and Development. In this article, I will describe the first phase (the R in R1D3) in detail. I've scheduled this
Things are changing

Things are changing

Hello my fellow cyberscouts, I have plenty of news to share with you and I need your help today! Warning: there are some words in this email, but I promise it's a VERY short one. Strings are everywhere my dude/dudette. * I am changing domains soon, going back