About Ragini Gurumurthy

This author has not yet filled in any details.
So far Ragini Gurumurthy has created 10 blog entries.

AI in the Intelligence Cycle – Dissemination Decisions (Part 4)

The final instalment of our blog series on AI’s potential for the threat intelligence cycle is here. After all the directing, collecting, and analysing, it’s time to disseminate, or publish the insights gathered for your client.  Dissemination is the most overlooked intelligence-cycle phase. Maybe that’s because it’s the end and,

By |2023-11-29T19:46:08+00:00November 29th, 2023|

AI in the Intelligence Cycle – Any Advantage for Analysis? (Part 3)

We’ve been busy thinking and writing about AI as applied to the four phases of the threat intelligence cycle (see our blogs on direction and collection), and it’s now time for analysis.  Can AI be a good match for what is arguably the most glamourous phase? When the Cyber Threat

By |2023-11-13T14:14:58+00:00November 13th, 2023|

AI in the Intelligence Cycle – A Role to Play in Collection? (Part 2)

Our first blog about the use of AI in the intelligence cycle covered the cycle’s first phase, direction. AI in collection, the next phase, is our focus of discussion today.  Of all the phases, collection is easily the most routine, mechanical, or even atomic. Unlike with the direction phase, collection

By |2023-10-02T10:54:30+00:00October 2nd, 2023|

The 2 Sides of AI – Which Should the CTI Analyst Choose?

AI has become nearly a household term. Its influence has seeped into multiple areas of our lives, promising direct benefits: significantly reducing errors in daily work, increasing accuracy and precision, and giving us freedom from repetitive tasks. Let’s take a look at how AI can play a supporting role in

By |2023-08-08T07:39:23+00:00July 31st, 2023|

Attribution in Cyber Threat Intelligence: Whodunnit?

Ever read a classic crime novel? The villain’s identity only becomes clear after a couple of plot twists and turns. Attribution in Cyber Threat Intelligence (CTI) sometimes feels like that kind of detective work. For the cyber-threat analyst, gathering clues and assigning responsibility for cyber-attacks to specific individuals, threat groups

By |2023-06-21T16:40:55+00:00June 21st, 2023|

The Power Of The Pivot

“Pivoting” is an often overlooked but critical feature of the day-to-day work of a Cyber Threat Intelligence (CTI) analyst. Possibly the earliest reference to the concept is within a cornerstone work for CTI, “The Diamond Model of Intrusion Analysis”, with the idea elaborated in the graphic below: Fig 1: The

By |2022-08-18T14:36:56+00:00August 17th, 2022|

Latest Addition To READ.’s Functionality: Graph Editing View

Elemendar has recently rolled out a graph editing feature within the READ. platform which allows the user to edit entities within a source document through a graph-based visual representation of the document. We’re now excited to present this deep dive into Graph Editing! Previously, the only way to edit documents

By |2022-08-18T14:36:57+00:00July 28th, 2022|
Go to Top