Research & Insights

Academy Blog

Cybersecurity research, threat analysis, intelligence insights, and strategic education from our analyst team.

136 articles
1. Audit Methodologies (COBIT, NIST, ISO) CS23 - Cybersecurity Auditing, Compliance & Assurance

1. Audit Methodologies (COBIT, NIST, ISO)

Read Article
4. Metrics, KPIs & Continuous Improvement CS22 - ISMS Implementation, Governance & ISO 27001 Management

4. Metrics, KPIs & Continuous Improvement

Read Article
3. SOC, SIEM & Security Operations Management CS22 - ISMS Implementation, Governance & ISO 27001 Management

3. SOC, SIEM & Security Operations Management

Read Article
2. Policies, Procedures & Governance Models CS22 - ISMS Implementation, Governance & ISO 27001 Management

2. Policies, Procedures & Governance Models

Read Article
1. ISO/IEC 27001 Controls & Implementation CS22 - ISMS Implementation, Governance & ISO 27001 Management

1. ISO/IEC 27001 Controls & Implementation

Read Article
4. Threat Modeling for Enterprise Systems CS21 - Enterprise Security Architecture & Zero-Trust Design

4. Threat Modeling for Enterprise Systems

Read Article
3. Micro-Segmentation CS21 - Enterprise Security Architecture & Zero-Trust Design

3. Micro-Segmentation

Read Article
2. Zero Trust Network Architecture (ZTNA) CS21 - Enterprise Security Architecture & Zero-Trust Design

2. Zero Trust Network Architecture (ZTNA)

Read Article
1. Security Architecture Frameworks (SABSA & TOGAF) CS21 - Enterprise Security Architecture & Zero-Trust Design

1. Security Architecture Frameworks (SABSA & TOGAF)

Read Article
5. YARA Rule Creation CS20 - Advanced Malware Analysis, Reverse Engineering & Countermeasures

5. YARA Rule Creation

Read Article
4. Behavioral analysis CS20 - Advanced Malware Analysis, Reverse Engineering & Countermeasures

4. Behavioral analysis

Read Article
3. Reverse engineering with IDA & Ghidra CS20 - Advanced Malware Analysis, Reverse Engineering & Countermeasures

3. Reverse engineering with IDA & Ghidra

Read Article