064. Books on Cyber Threat Intelligence I Like Most

Hello everyone! Today I decide to share a few books on cyber threat intelligence I often recommend. It won't be a long list, just four book to start.

Robert M. Lee, Jeff Haas, Threat Intelligence and Me: A Book for Children and Analysts

Have you ever tried to explain the basic concepts of cyber threat intelligence to a child? No? Well, Robert M. Lee and illustrator Jeff Haas did, and they succeeded quite well. By the way, the book is also suitable for adults, as its title suggests.

Thomas Roccia, Visual Threat Intelligence: An Illustrated Guide For Threat Researchers

This book also contains a wealth of illustrations and is suitable for those who want to understand all the concepts of cyber threat intelligence in the shortest possible time. There is, of course, a textual description as well, but it covers only a couple of pages for each topic. And it will save you a lot of time. It's perfect for those who dislike "fluff."

Kyle Wilhoit, Joseph Opacki, Operationalizing Threat Intelligence: A guide to developing and operationalizing cyber threat intelligence programs

If you are serious about diving into the world of cyber threat intelligence and plan to collect and consume it within your organization, this book is for you. It will help you understand the many nuances of cyber intelligence and develop a comprehensive understanding of the field.

Rebekah Brown, Scott J. Roberts, Intelligence-Driven Incident Response: Outwitting the Adversary (2nd Edition)

It is no secret that cyber threat intelligence is often the key to accurately identifying threats throughout the incident response lifecycle. This book is a practical guide to the intersection of cyber intelligence and incident response, designed for professionals of various backgrounds who are involved in combating modern cyber threats.

What are you favourite books on CTI?

See you tomorrow!



Comments

Popular posts from this blog

033. Free Google Threat Intelligence Course

001. The Zeltser Challenge

012. They Want to Know Everything About Your System!