Experience the ultimate flexibility with the Isolation API, allowing you to securely Quisque pellentesque id ultrices lacus ornare elit vitae ullamcorper. Learn More

Adam Huenke

Latest blogs

Topic : Adam Huenke
  • --Any--

OSINT is a perishable skill: How Skull Games kept me sharp

OSINT research and reporting are use-it-or-lose-it skills. To brush up on mine, I participated in a recent Skull Game to put OSINT to a…

Foolproof security of user web activity

Even the most security-aware users make mistakes and can accidentally expose their organizations’ networks to malware and other…

Why you should be on the dark web

Many people view the dark web as a place for illegal activities, but anyone in a cyber investigation or analysis role should be looking at…

Virtual machine vs. managed attribution: which is better?

Researchers have lots of options to manage their anonymity while performing online investigations, but not all solutions are created…

Give CTI its own seat at the table

Considering where cyberthreat intelligence teams should reside in the organizational structure can make a major difference in the…

Russia/Ukraine conflict: ZAPAD 2021’s insight into military operations

Russia’s joint military exercise ZAPAD in September 2021 seems a precursor to its invasion of Ukraine. We look at how the event prepared…

generia blog

Establishing an intelligence process for your CTI team

While many cyberthreat intelligence teams rely on the traditional “Intelligence Cycle” or F3EAD models as they are defined, creating a…

Conducting online investigations for cyberthreat intelligence

Get the basics on online investigations to build cyberthreat intelligence, including the role of OSINT, typical workflows and more.

Tools, tips and methodologies for cyberthreat intelligence gathering

Our experts offer their recommendations for tools and techniques for every stage of threat intelligence research process.

Blog updates

Stay updated with the latest posts from the blog
Close
Close