New blog, who dis?

Call me Jono - you can catch me on LinkedIn or follow me on Twitter if you want to know more!

I’ve worked in a number of roles in cyber security, both offensive and defensive, with my most recent role being in Threat Intel.

I love seeing the evolution of Threat Actor TTPs and the ways people devise to detect and mitigate them - it’s like playing 4D chess against an opponent you can’t see, trying to figure out their next move and how you can counter them.

The main objective of this project is to provide actionable
Threat Intel for Operators.

A lot of Threat Intel these days is aimed at selling products or telling you how many ways you can get whacked if you don’t use their MSSP service - that’s not all that useful for the day-to-day, I’ve found.

I’m aiming to help you keep on top of changes in the Threat Landscape - who’s doing what to whom, how and why are they doing it, and what can you do to make sure it doesn’t get to you.

Why subscribe?

Subscribe to get the latest issues of the newsletter sent straight to your inbox!

Paid subscriptions help me keep the lights on and provide access to exclusive content, including my personal Discord server that pulls newly published reports and research from a range of sources into the one place.

Subscribe to Opalsec

Actionable Threat Intelligence & analysis of emerging Infosec news, straight to your inbox. No marketing, no fluff - let's talk shop.

People