Adam Huenke

Latest blogs

Topic : Adam Huenke
  • --Any--
  • A8 Team
  • Aubrey Byron
  • Adam Huenke
  • Jared Campbell
  • Shannon Ragan
  • Abel Vandegrift
  • Amir Khashayar Mohammadi
  • Daniel Ben-Chitrit
  • Jeff Phillips
  • John K. Klassen
  • Justin Cleveland
  • Kurt Cunningham
  • Les Dunston
  • Matt Ashburn
  • Miguel Ramos
  • Ramesh Rajagopal
  • Scott Petry
  • Sean Heritage
  • Thom Kaye

The fall of FTX: What happened and what could have been done differently

The fall of FTX could have been predicted if researchers conducted proper blockchain analysis, but that didn’t happen until it was too late…

OSINT is a perishable skill: How Skull Games kept me sharp

OSINT research and reporting are use-it-or-lose-it skills. To brush up on mine, I participated in a recent Skull Game to put OSINT to a…

Foolproof security of user web activity

Even the most security-aware users make mistakes and can accidentally expose their organizations’ networks to malware and other…

Remote work is just work: secure the new normal

In honor of Cybersecurity Awareness Month, we examine the security and control issues that linger on as distributed workforces are here to…

Why you should be on the dark web

Many people view the dark web as a place for illegal activities, but anyone in a cyber investigation or analysis role should be looking at…

Virtual machine vs. managed attribution: which is better?

Researchers have lots of options to manage their anonymity while performing online investigations, but not all solutions are created…

Give CTI its own seat at the table

Considering where cyberthreat intelligence teams should reside in the organizational structure can make a major difference in the…

Russia/Ukraine conflict: ZAPAD 2021’s insight into military operations

Russia’s joint military exercise ZAPAD in September 2021 seems a precursor to its invasion of Ukraine. We look at how the event prepared…

generia blog

Establishing an intelligence process for your CTI team

While many cyberthreat intelligence teams rely on the traditional “Intelligence Cycle” or F3EAD models as they are defined, creating a…

Blog updates

Stay updated with the latest posts from the blog
Close
Close