Wembley PartnersNov 18, 20214 minWho Will Own The Metaverse?Zuckerberg made it clear that Meta does not want to be only recognized as a social media platform. What is it, then?
Wembley PartnersAug 26, 20216 minInsider Threats: When Trust Is Broken A great colleague, a malicious insider, or both? A deeper look into insider threats and the associated attack vectors.
Wembley PartnersAug 20, 20215 minHow Threat Actors Bypass 2-Factor AuthenticationYou're using 2-Factor Authentication. An excellent choice! But is it really as bulletproof as some say?
Wembley PartnersJun 10, 20214 minWhat is a Threat Intelligence-Led Penetration Test?How does a Threat Intelligence-led penetration test differ from a conventional one? We explore the differences and the similarities here.
Wembley PartnersMay 28, 20215 minWhat are the Use Cases for Cyber Threat Intelligence?We've discussed Cyber Threat Intelligence in depth this May. Now, let's talk about specific areas where CTI makes a meaningful difference.
Wembley PartnersMay 19, 20214 minThe 3 Flavors of Cyber Threat IntelligenceWe’ve discussed what Cyber Threat Intelligence is, and the various processes involved in its lifecycle. But not all CTI is made equal.
Wembley PartnersMay 14, 20214 minCyber Threat Intelligence is Just Information Collection, Right?There is a fine line between information and a useful piece of intelligence data. Let's see how they differ, and why that matters.
Wembley PartnersMay 7, 20214 minWhy Does Cyber Threat Intelligence Matter?In any historical period, the military valued one thing above all others before and during warfare: intelligence. But what about business?