Applying the Analysis of Competing Hypotheses to the Cyber Domain

February 13, 2020

For this paper, the Digital Shadows Photon Research team set out to define the strengths and weaknesses of ACH in the cyber-threat domain (Part I), and we did so with a "customer-centric" view that can aid analysts in presenting intelligence to a decision maker. Then we picked a cyber-threat subject and applied the seven steps of ACH analysis (Part II) to demonstrate the method's usefulness in particular scenarios, and the best approach for application. 

Check out our key revelations in this report. 

Previous Post
yOurMine, Equifax Indictment, and SWIFT POC attack
yOurMine, Equifax Indictment, and SWIFT POC attack

Roses are red, violets are blue, here’s our threat intel podcast, just for you!

Next Post
Threat Report ATT&CK Mapping (TRAM) With MITRE’s Sarah Yoder And Jackie Lasky
Threat Report ATT&CK Mapping (TRAM) With MITRE’s Sarah Yoder And Jackie Lasky

Sarah Yoder and Jackie Lasky from MITRE join Rick Holland and Harrison Van Riper in this guest episode to t...