| Blog and Public Talks | Https://validhorizon.medium.com |
| Blog and Public Talks | Https://validhorizon.medium.com |
“Figuring out adversary intent during an APT intrusion is hard. Sometimes you don’t have enough data. Some adversaries arrive in a network and have no idea where they are or what they have access to and their goals change as they move laterally and escalate privileges.”
Common Cyber Threat Intel Biases, by Matt Richard
https://medium.com/@mrichard91/common-cyber-threat-intel-biases-9d6f410f5829
And perhaps one that we can all too easily relate to:
“Threat narrative fallacy. This fallacy mirrors the traditional narrative fallacy — fitting threat activity into a clean story that fits our existing beliefs instead of objectively weighing the facts. Stories that fit broader geopolitical narratives about countries, political parties, and past objectives often absorb new data since it aligns with the existing story.“