Applying the Analysis of Competing Hypotheses to the Cyber Domain

For this paper, the Digital Shadows Photon Research team set out to define the strengths and weaknesses of ACH in the cyber-threat domain (Part I), and we did so with a "customer-centric" view that can aid analysts in presenting intelligence to a decision maker. Then we picked a cyber-threat subject and applied the seven steps of ACH analysis (Part II) to demonstrate the method's usefulness in particular scenarios, and the best approach for application. 

Check out our key revelations in this report. 

Previous Report
Forrester New Wave Report: Digital Risk Protection
Forrester New Wave Report: Digital Risk Protection

Digital Shadows Named a "Leader" in 2018 Forrester New Wave for Digital Risk Protection

Next Report
Two-Factor in Review
Two-Factor in Review

A technical assessment of the most popular mitigation for account takeover attacks

Your Practical Guide to Reducing Digital Risk

Get Your Copy!