About Ragini Gurumurthy

This author has not yet filled in any details.
So far Ragini Gurumurthy has created 13 blog entries.

Cyber Security And Cyber Risk: A Delicate Relationship

In the cyberspace realm, security is a relatively new concept; risk management has been ingrained in business for much longer than security considerations have. But they both serve a similar goal, and theoretically should be seen as complementary partners in the effort to stave off cyber threats.  Instead, observers point

By |2024-04-18T15:02:42+00:00April 18th, 2024|

Threat Intelligence: Friend or Foe in Cyber-Risk Management?

Cyber Threat Intelligence (CTI) is often criticised as behaving more like data than intelligence. When applied to cyber-risk management, that allegation isn’t wrong, but it’s ignoring the bigger picture.  Let’s first take a step back. CTI and cyber-risk management have emerged as two separate disciplines. Both have a common end

By |2024-03-13T16:44:52+00:00March 13th, 2024|

AI in the Intelligence Cycle – Dissemination Decisions (Part 4)

The final instalment of our blog series on AI’s potential for the threat intelligence cycle is here. After all the directing, collecting, and analysing, it’s time to disseminate, or publish the insights gathered for your client.  Dissemination is the most overlooked intelligence-cycle phase. Maybe that’s because it’s the end and,

By |2023-11-29T19:46:08+00:00November 29th, 2023|

AI in the Intelligence Cycle – Any Advantage for Analysis? (Part 3)

We’ve been busy thinking and writing about AI as applied to the four phases of the threat intelligence cycle (see our blogs on direction and collection), and it’s now time for analysis.  Can AI be a good match for what is arguably the most glamourous phase? When the Cyber Threat

By |2023-11-13T14:14:58+00:00November 13th, 2023|

AI in the Intelligence Cycle – A Role to Play in Collection? (Part 2)

Our first blog about the use of AI in the intelligence cycle covered the cycle’s first phase, direction. AI in collection, the next phase, is our focus of discussion today.  Of all the phases, collection is easily the most routine, mechanical, or even atomic. Unlike with the direction phase, collection

By |2023-10-02T10:54:30+00:00October 2nd, 2023|

The 2 Sides of AI – Which Should the CTI Analyst Choose?

AI has become nearly a household term. Its influence has seeped into multiple areas of our lives, promising direct benefits: significantly reducing errors in daily work, increasing accuracy and precision, and giving us freedom from repetitive tasks. Let’s take a look at how AI can play a supporting role in

By |2023-08-08T07:39:23+00:00July 31st, 2023|

Attribution in Cyber Threat Intelligence: Whodunnit?

Ever read a classic crime novel? The villain’s identity only becomes clear after a couple of plot twists and turns. Attribution in Cyber Threat Intelligence (CTI) sometimes feels like that kind of detective work. For the cyber-threat analyst, gathering clues and assigning responsibility for cyber-attacks to specific individuals, threat groups

By |2023-06-21T16:40:55+00:00June 21st, 2023|

The Power Of The Pivot

“Pivoting” is an often overlooked but critical feature of the day-to-day work of a Cyber Threat Intelligence (CTI) analyst. Possibly the earliest reference to the concept is within a cornerstone work for CTI, “The Diamond Model of Intrusion Analysis”, with the idea elaborated in the graphic below: Fig 1: The

By |2022-08-18T14:36:56+00:00August 17th, 2022|
Go to Top