No one can dispute that MITRE ATT&CK is now a cornerstone of modern Cyber Threat Intelligence. Many security programs have been built around the framework, including Elemendar’s flagship tool, READ. READ. uses machine learning to
Disinformation is the new kid on the block of the threat and risk analysis community. Tricky to define and challenging to anticipate multiple frameworks are being developed to help analyse the disinformation capabilities of malicious
As cyber security analysts, our job can be challenging. We often face a never-ending backlog of threat intelligence reports, which leaves little time for actual analysis. Manual processing of these reports is time-consuming and can
In the face of an economic downturn, if not outright recession, cyber-security budgets are being scrutinised right alongside everything else. Many CISOs question what’s being spent on Cyber Threat Intelligence (CTI). They’re forgetting – or
This autumn/fall, the Elemendar team have been sharing the summer advancements made in READ. far and wide, from our clients on three continents to events in Brussels and Singapore. Elemendar in Top 20 European Scaleups!
Each day we escape an infinite number of scenarios that could have unfolded, but didn’t. The damage they might have wrought is what justifies security defence, but the cost of ‘what if’ scenarios isn’t easy
“Shields Up” is a current initiative that was launched by the US Cybersecurity and Infrastructure Security Agency's (CISA) earlier this year. With the aim to protect the US and organisations from cyber threats spilling over amid
The Elemendar team is saddened by the passing of Queen Elizabeth ll; our thoughts are with those who also mourn. Product Updates Full STIX 2.1 support - Recently we introduced STIX 2.1 capabilities into READ.
Elemendar is proud to be one of the main sponsors for the upcoming Safe House Global event on Multi-Modal Warfare! Safehouse events are known throughout the industry as being at the cutting edge of cyber
“Pivoting” is an often overlooked but critical feature of the day-to-day work of a Cyber Threat Intelligence (CTI) analyst. Possibly the earliest reference to the concept is within a cornerstone work for CTI, “The Diamond