If cyber threats had a most-wanted list, Chip would be the detective cracking the case! My blog dives deep into the world of cyber intelligence, unraveling attacks, trends, and security tactics with a mix of wit and wisdom. Whether you’re a seasoned pro or just cyber-curious, expect insights that pack a punch—no fluff, just the good stuff!
-
Fusion Centers: The High-Powered CPU of Cyber Security
Blog originally published on Medium – Jan 18, 2025 When was the last time your organization made a business decision without understanding the risks? I am sure many times and hope not anymore. But let’s be honest — how often does your security team’s involved in it. Many times they… Read More ⇢
-
Data Leaks: The Silent Reputation Killer & Compliance Nightmare
Blog originally published on Medium – Mar 2, 2025 A Leak is More Than Just a Leak Imagine a tiny crack in a dam. Now, imagine that crack expanding until the entire structure collapses. That’s exactly how a data leak works. It starts small — maybe an exposed database or… Read More ⇢
-
My 5W Strategy – In life, In Intelligence and In SOC Operations
In life, intelligence analysis, and cybersecurity, making sense of complex situations and uncovering the truth requires asking the right questions. My 5W Strategy is built on answering five key questions: “What happened?“, “Why did it happen?“, “Why did it happen that way?“, “What did we do about it?“, and “Who… Read More ⇢
-
From Down Under to Digital Uproar: Australia’s Battle Against Cyber Critters”
Following table shows a quick overview on the 6 Cyber Shields, however I do encourage to read the full content – https://www.homeaffairs.gov.au/about-us/our-portfolios/cyber-security/strategy/2023-2030-australian-cyber-security-strategy Shield Key Actions Additional Suggestions for Implementation Strong businesses and citizens 1. Support SMEs in cyber security.2. Help Australians defend against cyber threats.3. Disrupt cyber threat actors.4. Break… Read More ⇢
-
Essential Intel: Using CTI to Map the Essential Eight Against CL0P Ransomware
The Essential Eight represents fundamental cybersecurity strategies every organization should implement to reduce attack surfaces and strengthen defences. However, organisations often struggle with prioritising which controls to implement first and how to optimize them against real-world threats. Cyber Threat Intelligence (CTI) can provide the needed visibility to guide Essential Eight… Read More ⇢
-
Australian Ransomware Threat Landscape 2022
Readers! Happy New Year and Well Wishes. I thought to write about our beloved topic, Ransomware, and this time will focus on Australia. In this blog, I will not be diving into the workings of actual ransomware or doing a technical deep dive on actual samples. However, with some statistics,… Read More ⇢
-
Actor types
Following mind-map shows actor types Script Kiddie Unskilled individuals who use programs developed by others to attack computer systems Attributes : Attributes Internal/External: External to their target Level of Sophistication: Typically have limited resources. Resources/Funding: The amount, sophistication, and extent of their attacks is constrained. Intent/Motivation: Motivated by prestige. Hacktivist… Read More ⇢
-
Post #2 Intelligence Life Cycle – Collection
The collection phase helps respond to Intelligence requirements (including PIRs) and supports decision-makers and the Intelligence team. In this phase, the Intelligence team can develop a strategy to collect data directly related to the requirements. The data can either be sourced internally or externally. Question PIR IR Sources What or where… Read More ⇢
-
Post #1 Intelligence Life Cycle – Planning & Direction – Intelligence Requirements
Happy New Year to all, and let’s hope the year 2022 brings us good things. Unfortunately, 2021 was a bit hectic, which impacted my blog writing. So with this new year, I wanted to keep writing and start with one of my favourite topics – Intelligence. The post (hopefully others)… Read More ⇢











