From efa3d9b56ca6926ac22c677b4443d0c562ecfcef Mon Sep 17 00:00:00 2001 From: Cypher Date: Wed, 25 May 2022 21:48:32 -0400 Subject: [PATCH] Update README.md --- README.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/README.md b/README.md index de82de2..6e5cda9 100644 --- a/README.md +++ b/README.md @@ -8,7 +8,7 @@ A collection of essential resources related cyber threat intelligence theory | Author | Description | Resource URL | | --- | --- | --- | | [The US Central Intelligence Agency](https://en.wikipedia.org/wiki/Central_Intelligence_Agency)| The traditional Intelligence cycle describes how intelligence is ideally processed in civilian and military intelligence agencies, and law enforcement organizations. | [the-intelligence-cycle.html](https://web.archive.org/web/20200508151219/https://www.cia.gov/kids-page/6-12th-grade/who-we-are-what-we-do/the-intelligence-cycle.html)| -| [Recorded Future](https://recordedfuture.com)| The traditional intelligence life cycle tailored to threat intelligence embedded in modern security options| [What the 6 Phases of the Threat Intelligence Lifecycle Mean for Your Team](https://web.archive.org/web/20210330021716/https://www.recordedfuture.com/threat-intelligence-lifecycle-phases/) | +| [Recorded Future](https://recordedfuture.com)| The traditional intelligence life cycle tailored to threat intelligence embedded in modern security operations| [What the 6 Phases of the Threat Intelligence Lifecycle Mean for Your Team](https://web.archive.org/web/20210330021716/https://www.recordedfuture.com/threat-intelligence-lifecycle-phases/) | | [The US Central Intelligence Agency](https://en.wikipedia.org/wiki/Central_Intelligence_Agency) | This primer highlights structured analytic techniques—some widely used in the private sector and academia, some unique to the intelligence profession | [Tradecraft-Primer-apr09.pdf](https://www.cia.gov/static/955180a45afe3f5013772c313b16face/Tradecraft-Primer-apr09.pdf) | | [iSIGHT Partners](https://www.linkedin.com/company/isight-partners) | The first definitive guide to cyber threat intelligence ever produced | [cti-guide.pdf](https://cryptome.org/2015/09/cti-guide.pdf) | | [David J. Bianco](https://twitter.com/DavidJBianco) | Analysing relationships between the types of indicators you might use to detect an adversary's activities and how much pain it will cause them when you are able to deny those indicators to them | [the-pyramid-of-pain.html](https://detect-respond.blogspot.com/2013/03/the-pyramid-of-pain.html) |