Applying the Analysis of Competing Hypotheses to the Cyber Domain

For this paper, the Digital Shadows Photon Research team set out to define the strengths and weaknesses of ACH in the cyber-threat domain (Part I), and we did so with a "customer-centric" view that can aid analysts in presenting intelligence to a decision maker. Then we picked a cyber-threat subject and applied the seven steps of ACH analysis (Part II) to demonstrate the method's usefulness in particular scenarios, and the best approach for application. 

Check out our key revelations in this report. 

Previous Report
From Exposure to Takeover: The 15 billion stolen credentials allowing account takeover
From Exposure to Takeover: The 15 billion stolen credentials allowing account takeover

Over the past 2.5 years, we have been analyzing how cybercriminals conspire to prey upon users of online se...

Next Report
Cyber Threat Intelligence Estimate
Cyber Threat Intelligence Estimate

Digital Shadows has contributed to Optiv's 2020 Threat Intelligence Landscape Estimate, which provides a vi...

Digital Shadows Named #1 in Digital Risk Protection

Read Report