Deception Technology

Deception Tech: The Art of Cyber Counterintelligence

Deception technology is one of the most effective cybersecurity technologies available today. Here's how to use it ...
Security Boulevard
AI — Making Us What Again?

AI — Making Us What Again?

AI — Making Us What Again?2 min read·Just now--Smart? Clever? Productive? OH BOYIs the fox out of place? Am I invading their space? Or is it just plain loss?Welcome the current events ...
How Flashpoint Shaped the News: A Year of Blogs and Press

How Flashpoint Shaped the News: A Year of Blogs and Press

This year, Flashpoint intelligence analysts worked with reporters at a wide variety of publications serving a variety of audiences across the private and public sectors. Their expertise—along with many of the 150 ...
Three Types of Threat Intelligence: Defined and Explained

Three Types of Threat Intelligence: Defined and Explained

Depending on why it’s collected and what information it yields, the umbrella of threat intelligence can be divided into three major pillars: strategic, operational, and tactical. The post Three Types of Threat ...
Three Types of Threat Intelligence: Defined and Explained

Three Types of Threat Intelligence: Defined and Explained

Depending on why it’s collected and what information it yields, the umbrella of threat intelligence can be divided into three major pillars: strategic, operational, and tactical. The post Three Types of Threat ...
Five Must-Have Skills Every Cyber Threat Intel Analyst Should Possess

Five Must-Have Skills Every Cyber Threat Intel Analyst Should Possess

Cyber threat intelligence analysts play an indispensable role in helping organizations understand their threat landscape and protect themselves from risk. The post Five Must-Have Skills Every Cyber Threat Intel Analyst Should Possess ...
Five Must-Have Skills Every Cyber Threat Intel Analyst Should Possess

Five Must-Have Skills Every Cyber Threat Intel Analyst Should Possess

Cyber threat intelligence analysts play an indispensable role in helping organizations understand their threat landscape and protect themselves from risk. The post Five Must-Have Skills Every Cyber Threat Intel Analyst Should Possess ...
Social Media Intelligence: Addressing National Security Challenges with SOCMINT

Social Media Intelligence: Addressing National Security Challenges with SOCMINT

Social media intelligence is a relatively new intelligence discipline in the public sector. Emerging SOCMINT technologies help address common challenges associated with leveraging public social data at scale, such as data overload, ...

Great information in need of polish from Meta

While the content of the report is excellent, it needs more copy editing and better layout. It's clearly a labor of love by the technical teams at Meta, rather than a marketing ...
What Is Open Source Intelligence: The Importance of OSINT in Your Organization’s Threat Landscape

What Is Open Source Intelligence: The Importance of OSINT in Your Organization’s Threat Landscape

Open-source intelligence, or OSINT, refers to the process of gathering information from public, legal data sources to serve a specific function. Some open sources might include social media, blogs, news, and the ...