Wembley PartnersNov 18, 20214 min readWho Will Own The Metaverse?Zuckerberg made it clear that Meta does not want to be only recognized as a social media platform. What is it, then?
Wembley PartnersAug 26, 20216 min readInsider Threats: When Trust Is Broken A great colleague, a malicious insider, or both? A deeper look into insider threats and the associated attack vectors.
Wembley PartnersAug 20, 20215 min readHow Threat Actors Bypass 2-Factor AuthenticationYou're using 2-Factor Authentication. An excellent choice! But is it really as bulletproof as some say?
Wembley PartnersJun 10, 20214 min readWhat is a Threat Intelligence-Led Penetration Test?How does a Threat Intelligence-led penetration test differ from a conventional one? We explore the differences and the similarities here.
Wembley PartnersMay 28, 20215 min readWhat are the Use Cases for Cyber Threat Intelligence?We've discussed Cyber Threat Intelligence in depth this May. Now, let's talk about specific areas where CTI makes a meaningful difference.
Wembley PartnersMay 19, 20214 min readThe 3 Flavors of Cyber Threat IntelligenceWe’ve discussed what Cyber Threat Intelligence is, and the various processes involved in its lifecycle. But not all CTI is made equal.
Wembley PartnersMay 14, 20214 min readCyber Threat Intelligence is Just Information Collection, Right?There is a fine line between information and a useful piece of intelligence data. Let's see how they differ, and why that matters.
Wembley PartnersMay 7, 20214 min readWhy Does Cyber Threat Intelligence Matter?In any historical period, the military valued one thing above all others before and during warfare: intelligence. But what about business?