- Communication How You Can Write Better Threat Reports
Writing about cybersecurity threats requires deciding what details to include, demonstrating sound analysis, and addressing multiple audiences. A rating sheet checklist can help ensure threat reports...
- Malware Analysis Learning Malware Analysis and Cybersecurity Writing Online
- Tools How to Set Up a SpiderFoot Server for OSINT Research
SpiderFoot automates OSINT collection from numerous data sources, including Shodan and Have I Been Pwned, to gather intelligence about IPs, domains, and email addresses. Running the free, open source...
- Leadership What's It Like for a New CISO?
Transitioning into a CISO role involves forming an information security program, justifying cybersecurity purchases with business-relevant details, and addressing practical challenges like enabling...
- Communication Top 10 Cybersecurity Writing Mistakes
Common writing mistakes span structure, look, words, tone, and information—the key aspects that work together to capture and hold readers' attention. Avoiding these pitfalls strengthens technical...
- Malware Analysis The State of Malware Analysis: Advice from the Trenches
Practitioners who analyze malware for a living share insights on which approaches work well, how tools and methodologies are evolving, and what career paths exist for analysts. Topics include the...