Role of Cyber Threat Intelligence Analysts in an Organization

September 19, 2019 | Irfan Shakeel
Irfan Shakeel

Irfan Shakeel


Irfan Shakeel is the founder of and creates future cyber security professionals by offering quality cyber security education at EH Academy. You can connect with him on Twitter (@irfaanshakeel) and LinkedIn.

September 19, 2019 | Irfan Shakeel

Role of Cyber Threat Intelligence Analysts in an Organization

Threat intelligence is evidence-based information, including context, mechanisms, indicators of compromise, implications and actionable advice, about existing or emerging hazards to assets. Threat intelligence allows IT professionals to make decisions and take action accordingly. Historically, intelligence tactics, techniques, and procedures as well as various types of intelligence operations existed long before cyberspace was conceived. Intelligence often seen as “offensive…

March 6, 2019 | Irfan Shakeel

How Does Whonix Make Kali Linux Anonymous & How to Prevent It?

The Internet was not designed with anonymity in mind, but things have changed. Anonymity has become a necessary and legitimate objective in many applications (browsing the internet, chatting, sending instant messages etc.). The main reason for this is that even if traffic is encrypted, only the content is encrypted. It is still possible to know the source and destination of…

Get the latest
security news
in your inbox.

Subscribe via email


January 7, 2019 | Irfan Shakeel

How to Build an Effective Threat Intelligence Team

Cyber threats are rapidly evolving due to broadening motivations behind attacks, and the increased sophistication of attacks themselves. Protecting organizations from cyber threats often requires expertise available outside the organization. For security professionals and executives, threat intelligence is the information that expands your visibility into cyber threats beyond the physical edge of your network. Conducting threat intelligence that is significant…

October 24, 2017 | Irfan Shakeel

Achieving Online Anonymity Using Tails OS

Achieving anonymity while browsing the internet is the main concern for many people; everybody wants to make their communications secure and private. However, few in the world have really achieved this objective and many are still facing difficulties and trying different techniques to achieve online privacy. The InfoSec community has produced various tools and techniques that utilize the TOR network…

July 26, 2017 | Irfan Shakeel

Revealing the Power of Cyber Threat Intelligence

In today’s cyber world, decision makers continuously question the value of their security investments, asking whether each dollar is serving to secure the business. In the meantime, cyber attackers are continually growing smarter and more proficient. Today’s security teams frequently find themselves falling behind and left to analyze artifacts from the past and try to decide…

June 7, 2017 | Irfan Shakeel

Configuring Kali Linux on Amazon AWS Cloud for FREE

Kali Linux is the most desired pentesting distribution. There are number of tutorials for Kali Linux available on the Internet. Having said that, people constantly complain about not getting the public IP (WAN). They also complain that they can only use it within their local network. We can resolve this problem by opening a Linux computer to the internet, which…

September 28, 2016 | Irfan Shakeel

Mobile Application Security Challenges

The number of mobile cyber security attacks is continuing to grow. There are millions of mobile devices being infected by malicious code every day. The Ponemon Institute and IBM Security study, which researched security practices in over 400 large organizations, found that average companies only test their half of the mobile apps they develop. Around 50% of these organizations were found to…

August 16, 2016 | Irfan Shakeel

Intelligent Cyber Defense using Threat Analysis

Traditional cyber security strategy focuses on blocking known cyber threats and attack vectors. This strategy revolves around vulnerability assessment, active defense using the IDS and firewall, and an incident response plan to handle critical situations after a security breach. The overall strategy depends on pre-identified threats and tools designed to find and block known malware and attack vectors. But, what…