EclecticIQ

Resources

Access the latest resources including White Papers, Case Studies, Product Descriptions, Analysts Reports, and more, covering the topic of Cyber Threat Intelligence. Experts share their insights for Threat Analysts, Security Analysts, Managers of Threat Intelligence / SOC / CERT, and CISOs.

White Paper
White Paper

The Tradecraft of a Successful Threat Investigation: A COVID-19 Case Study English

What does it take to run a successful threat investigation with global implications? Since February 2020, we at EclecticIQ have tracked adversaries as they put their malicious tactics, techniques, and procedures (TTPs) into high gear to take advantage of organizations shifting focus from security to the COVID-19 health crisis.

Download White Paper
White Paper
White Paper

Threat Data Ingestion: Get the Best of Both Worlds English

Selecting a threat intelligence platform (TIP) is a complex decision that often puts the CTI and the IT Ops teams at odds with each other. The CTI team demands high-fidelity threat data. The IT Ops team requires a TIP with predictable and manageable scalability.

Download White Paper
White Paper
White Paper

Beyond the IOC with Cyber Threat Intelligence (CTI) English

Indicators of Compromise (IOCs) have their place in cybersecurity, but as cyber threats evolve, they have become ineffective in threat detection. In order to detect the techniques, tactics and procedures (TTPs) of adversaries as well as to fully understand and anticipate threats, we have to go Beyond the IOC with structured intelligence.

Download White Paper
White Paper
White Paper

STIX 2.1 - Build your own intelligence English

This White Paper introduces STIX 2.1, compares it with the existing STIX 1.2 architecture and shows the future for STIX 2.x.

Download White Paper
White Paper
White Paper

Building a Threat Intelligence Practice English

How to make threat intelligence relevant to executives, business stakeholders, security operations and incident responders.

Download White Paper
White Paper
White Paper

Applying the Threat Intelligence Maturity Model to your organization English

This paper provides a framework to assess the maturity of threat intelligence efforts and guide future investments.

Download White Paper
White Paper
White Paper

Augment your SOC with human-led threat intelligence English

Learn about the limitations of automation in the Security Operations Center. Find out why SOCs should let humans take the lead in handling intelligence. Discover how to achieve the benefits of an integrated, intelligence-led cyber defense capability powered by a Threat Intelligence Platform.

Download White Paper
White Paper
White Paper

Accelerate Incident Response with Threat Intelligence English

This paper explains how Threat Intelligence improves Incident Response (IR) and how to introduce Threat Intelligence into your IR practice - with two use cases from Fox-IT.

Download White Paper
White Paper
White Paper

Using a Robust Platform for Training Purposes English

Cyber threat analysts are hard to find, and are being heavily recruited by enterprises and governments. The problem is that threat intelligence has a steep learning curve, even for IT professionals in related fields. That’s why Cyber Threat Intelligence Network (CTIN) advocates a new approach to training cyber threat analysts: Use a Threat Intelligence Platform (TIP) as a hands-on instructional tool.

Download White Paper