Stephanie Scorgie’s Post

View profile for Stephanie Scorgie, graphic

Professionalism in CTI & Coverage Mapping | Threat Informed Defense Advocate | Advisor to Information Security Executives | Economics

It's thrilling to witness the growing recognition of threat quantification and prioritization, a field that was once quite niche, now becoming a vital part of the cyber lexicon. At Tidal Cyber, we literally wrote the book on Cyber Threat Profiling. Built on the foundational work of the #threatintelligence and #threatinformeddefense communities (which we prominently highlight throughout), our guide remains incredibly popular even a year after its release. If you haven't explored it yet, download it here: https://lnkd.in/ga6hHKqF. Our clients benefit from continuously updated and streamlined guidance on identifying and quantifying relevant cyber threats, thanks to our iterative and refined methodology. Our extensive library of curated Threat Profiles is constantly expanding alongside the evolving #threat landscape. Advanced users also have the flexibility to customize or build their own profiles based on unique #CTI insights. If you’d like to explore our collection or learn how to operationalize your threat profiles effectively, let us know: https://lnkd.in/eTHdQGZe.

  • No alternative text description for this image
Carlo D.

Cyber Security Professional, CISSP

6mo

the problem is that most RaaS are unifying and sharing data, it means the threat isn't anymore so tailored but based on previously discovered exposed services and they exchange compromised networks to each other, this will make promiscuous which focus each group is having, excluding for the highly political one. There is a risk prioritizing, for example based on the industry, you can see the mistake that many ecommerce are doing with Magecart, it's not a well defined group and many struggle to pigeonhole them but they did more damage than many groups sum up together and they are probably a SaaS tool used by most of them as side channel gig income.... and companies are still doing nothing in DOM security in their baskets, just praying

Like
Reply

To view or add a comment, sign in

Explore topics