Intelligence to Risk
Subscribe
Sign in
Home
Notes
Archive
About
Latest
Top
Discussions
Fraud Funding Terrorism?
The Cost of Missing Sanctioned Connections in a Globalized Fraud Ecosystem
Dec 17, 2024
•
Levi Gundert
and
Ilya Volovik
3
Share this post
Intelligence to Risk
Fraud Funding Terrorism?
Copy link
Facebook
Email
Notes
More
November 2024
The Need for Cyber Fraud Fusion Centers
From Magecart to Mobile Menaces
Nov 19, 2024
•
Levi Gundert
and
Stas Alforov
3
Share this post
Intelligence to Risk
The Need for Cyber Fraud Fusion Centers
Copy link
Facebook
Email
Notes
More
October 2024
The Resilience Dilemma
How Complexity Influences Security Outcomes in a Volatile World
Oct 15, 2024
•
Levi Gundert
1
Share this post
Intelligence to Risk
The Resilience Dilemma
Copy link
Facebook
Email
Notes
More
July 2024
Speed and Scale: How Threat Volume and Velocity Shape Cyber Risk Narratives for Governance Bodies
Developing stories that instill confidence in governance bodies (GBs) is prominent in many CISO discussions - but not all stories carry the same value.
Jul 23, 2024
•
Levi Gundert
1
Share this post
Intelligence to Risk
Speed and Scale: How Threat Volume and Velocity Shape Cyber Risk Narratives for Governance Bodies
Copy link
Facebook
Email
Notes
More
May 2024
Navigating the Shifting Sands of CISO Expectations
I recently broke bread with a cybersecurity executive who had just finished his tenure at a large financial services company in Singapore.
May 16, 2024
•
Levi Gundert
3
Share this post
Intelligence to Risk
Navigating the Shifting Sands of CISO Expectations
Copy link
Facebook
Email
Notes
More
December 2023
Leading with Intelligence: Winning Against Credential Theft
Are security analytics the key to improving transparency and managing legal or compliance risks?
Dec 14, 2023
•
Levi Gundert
,
Dmitry Smilyanets
,
Candace Moix
, and
Dylan
2
Share this post
Intelligence to Risk
Leading with Intelligence: Winning Against Credential Theft
Copy link
Facebook
Email
Notes
More
November 2023
Cyber Silk Road: Tracing China’s Stealth Turn
For the past two decades, when Chinese government employees hacked foreign networks, the process was often the physical world equivalent of a “smash and…
Nov 7, 2023
•
Levi Gundert
and
Megan Keeling
3
Share this post
Intelligence to Risk
Cyber Silk Road: Tracing China’s Stealth Turn
Copy link
Facebook
Email
Notes
More
October 2023
Charting New Terrain: The Shift to Resilience and Proximity in Cyber Risk
Reimagine the Graph
Oct 3, 2023
•
Levi Gundert
7
Share this post
Intelligence to Risk
Charting New Terrain: The Shift to Resilience and Proximity in Cyber Risk
Copy link
Facebook
Email
Notes
More
September 2023
Beyond the Code: Unearthing the Subtle Business Ramifications of Six Months in Vulnerabilities
At Recorded Future, we’re determined to iteratively answer the “So What?
Sep 7, 2023
•
Levi Gundert
and
David C
1
Share this post
Intelligence to Risk
Beyond the Code: Unearthing the Subtle Business Ramifications of Six Months in Vulnerabilities
Copy link
Facebook
Email
Notes
More
The Risk Business: Second Edition
What Leaders Need to Know About Intelligence and Risk-Based Security
Sep 5, 2023
•
Levi Gundert
3
Share this post
Intelligence to Risk
The Risk Business: Second Edition
Copy link
Facebook
Email
Notes
More
August 2023
From Direct to Distant: The Challenge of Third and Fourth-Party Digital Risk Management
On July 31, The Information published an article titled “In an Unusual Move, Nvidia Wants to Know Its Customers’ Customers.” It occurred to me that…
Aug 15, 2023
•
Levi Gundert
4
Share this post
Intelligence to Risk
From Direct to Distant: The Challenge of Third and Fourth-Party Digital Risk Management
Copy link
Facebook
Email
Notes
More
July 2023
Cyber Attacks on NGOs: The Underreported Threat to Global Humanitarian Work
Cyber events can cause risk impacts that extend beyond business.
Jul 18, 2023
•
Levi Gundert
2
Share this post
Intelligence to Risk
Cyber Attacks on NGOs: The Underreported Threat to Global Humanitarian Work
Copy link
Facebook
Email
Notes
More
Share
Copy link
Facebook
Email
Notes
More
This site requires JavaScript to run correctly. Please
turn on JavaScript
or unblock scripts