The Power Of The Pivot
“Pivoting” is an often overlooked but critical feature of the day-to-day work of a Cyber Threat Intelligence (CTI) analyst. Possibly the earliest reference to the concept is within a cornerstone work for CTI, “The Diamond Model of Intrusion Analysis”, with the idea elaborated in the graphic below: Fig 1: The