Anthony Kraudelt

49 Followers
18 Following
145 Posts

I’m an experienced cyber‑security professional with a career spanning two decades of service with the Federal Bureau of Investigation. During my tenure I've led investigative cyber‑operations, risk‑assessment initiatives, and incident‑response teams that protected high‑technology environments from emerging threats. My work has consistently emphasized rapid triage, thorough forensic analysis, and the implementation of advanced mitigation techniques that keep critical systems secure.

I possess a Master’s in Information Security and have graduated from the SANS Institute with a Graduate Certificate in Cyber Defense among other degrees. I also hold a portfolio of industry certifications - including the ISC2 CISSP, multiple SANS credentials, numerous CompTIA and other industry specific certifications. These qualifications underpin a deep technical expertise that bridges policy, architecture, and hands‑on threat hunting.

Websitehttps://www.kraudelt.com
Credlyhttps://www.credly.com/users/anthonykraudelt/badges
LinkedInhttps://www.linkedin.com/in/anthonykraudelt/

Should the industry start to move away from the use of the term Advanced Persistent Threat (APT) as a way of describing a cyber intruder? Due to its broad use across several threat-actor categories it seems to be used indiscriminately to describe all types of attacks. If media reporting and industry discussions label everything from highly motivated financial threats to nation-state actors as "APT", maybe it's time the term is retired.

#APT #cybersecurity #MICE

With increased threats against Microsoft InTune; administrators should consider utilizing multi-admin authentication for specific administrative level tasks including the deletion or wiping of devices. Although this may seem like an additional burden, if a threat-actor gains access to a single administrative credential this could mean a complete wipe of all InTune assets.

https://techcommunity.microsoft.com/blog/intunecustomersuccess/best-practices-for-securing-microsoft-intune/4502117

#intune #admin #cybersecurity

Best practices for securing Microsoft Intune | Microsoft Community Hub

Microsoft Intune gives IT and security teams a powerful way to manage endpoints at scale - deploying apps, enforcing security baselines, and configuring the...

TECHCOMMUNITY.MICROSOFT.COM

@TiamatEnity thank you for the boost on my post about my new book. It's important that we share as much knowledge as possible. It's not about making money it's about being successful engaging in cyber defense!

#defense #cybercrime #cybersecurity

Love knowledge, but hate paying for it? My book, How MICE Threaten Cyber Security, is available on the Libby and Hoopla apps. Ask your local library to order a digital copy!

#cyber #threats #book #cybersecurity

Cyber security isn't about luck, it's about preparation. This St. Patrick's day prepare yourself with knowledge about the threats targeting your systems. Checkout my book, How MICE Threaten Cyber Security. Available at Amazon.

#stpatricksday #cybersecurity #cybercrime #MICE

Hot take from a guy who spent two decades at investigating cyber crimes:

The term "hacker" tells you almost nothing useful.

What matters, what actually predicts behavior, tactics, and targets,
is WHY they're doing it.

The intelligence community has used M.I.C.E for 70 years to understand spies. That model is shifted to a new ear of online threats.

Money. Ideology. Curiosity . Ego.

I wrote a book applying it to cybersecurity. Not because it's theoretical.

Because in the field, understanding motivation is how you get ahead of attacks.

A money-motivated attacker runs a different kill chain than an ego-driven one.

Treat them the same and your defenses will always be one step behind.

Happy to talk through any of it here. The infosec community on Bluesky
has been one of the best conversations I've had about this stuff.

Book: 'How MICE Threaten Cyber Security' on Amazon.
https://a.co/d/0awR4gNr

#infosec #cybersecurity #threatmodeling

How MICE Threaten Cyber Security: The Mindsets Behind Threat-actors in Our Digital Age: Kraudelt, Anthony: 9798242742079: Amazon.com: Books

How MICE Threaten Cyber Security: The Mindsets Behind Threat-actors in Our Digital Age [Kraudelt, Anthony] on Amazon.com. *FREE* shipping on qualifying offers. How MICE Threaten Cyber Security: The Mindsets Behind Threat-actors in Our Digital Age

Most people think the biggest cyber threat is a shadowy hacker in a hoodie.

After two decades investigating cyber criminals I can tell you the real answer is far more human.

The intelligence community has used a framework called M.I.C.E for decades to explain why people betray their country. I've spent years applying it to explain why people and organizations get compromised online.

M.I.C.E stands for: Money. Ideology. Curiosity. Ego.

These are the four core motivations behind virtually every cyber attack I've ever investigated. And understanding WHY an attacker acts changes everything about how you defend against them.

→ Money-motivated attackers move fast. Smash and grab.

→ Ideology-motivated attackers are patient. They'll wait months.

→ Curiosity-interest and inquisitiveness leaving to growth .

→ Ego-driven hackers want you to KNOW they were there.

Each motivation requires a completely different defensive posture.

That's the foundation of my new book: How MICE Threaten Cyber Security.

If you work in security, HR, risk, or lead a team - this framework will
change how you think about your threat landscape.

It's available now on Amazon. https://a.co/d/0awR4gNr

#cybercrime #CyberThreat #MICE

Don't let luck be your security plan this St. Patrick's Day. Checkout the book, How MICE Threaten Cyber Security. Available at Amazon: https://a.co/d/0awR4gNr
@Prometheus thanks for the boost on my post about click-fix Scams. Scams are everywhere, keep alert and keep safe!

How easy is it to create click-fix images for pop-ups? Apparently after my chosen AI said NO, I just needed to ask a second time.

Remember, cyber threat-actors don't need to catch all of us, they just need one of us

Stay safe by reading, How MICE Threaten Cyber Security. Available at Amazon. https://a.co/d/0awR4gNr