Uncategorized

Threat Intelligence: Friend or Foe in Cyber-Risk Management?

Cyber Threat Intelligence (CTI) is often criticised as behaving more like data than intelligence. When applied to cyber-risk management, that allegation isn’t wrong, but it’s ignoring the bigger picture.  Let’s first take a step back. CTI and cyber-risk management have emerged as two separate disciplines. Both have a common end

By |2024-03-13T16:44:52+00:00March 13th, 2024|

Blending Threat And Risk Inside The Security Operation Center

Threat and risk are different but connected concepts. Threat indicates the motivation, capability, and intent of an adversary; risk is the likelihood of a cyber-attack multiplied by its potential impact. At the strategic level, it’s clear how the two concepts are related – specifically, the assessed threat level of an

By |2024-01-31T16:21:05+00:00January 31st, 2024|

Escalation in Focus: The UK Deterrence and Assurance Academic Alliance (DAAA) Conference

This month we had the pleasure to attend and present at the UK Deterrence and Assurance Academic Alliance (DAAA) Conference hosted by Defence Science and Technology Laboratory in conjunction with the Scottish Council on Global Affairs. The focus was on the process of escalation – defined as: a situation, such

By |2023-12-11T14:31:56+00:00December 11th, 2023|

AI in the Intelligence Cycle – Dissemination Decisions (Part 4)

The final instalment of our blog series on AI’s potential for the threat intelligence cycle is here. After all the directing, collecting, and analysing, it’s time to disseminate, or publish the insights gathered for your client.  Dissemination is the most overlooked intelligence-cycle phase. Maybe that’s because it’s the end and,

By |2023-11-29T19:46:08+00:00November 29th, 2023|

Elemendar News 32

Since we last let you in on what's been going on at Elemendar, Q4 has seen us sharing expertise far and wide as well as many product advancements. Continue reading to find out more… Product Updates We are hard at work developing new applications for AI tools in security, including:

By |2023-11-27T12:20:45+00:00November 27th, 2023|

AI in the Intelligence Cycle – Any Advantage for Analysis? (Part 3)

We’ve been busy thinking and writing about AI as applied to the four phases of the threat intelligence cycle (see our blogs on direction and collection), and it’s now time for analysis.  Can AI be a good match for what is arguably the most glamourous phase? When the Cyber Threat

By |2023-11-13T14:14:58+00:00November 13th, 2023|
Go to Top