Cyber Threat Intelligence and Digital Sovereignty

The field of cybersecurity is moving towards more proactive and visual approaches to threat hunting and intelligence gathering. This is evident in the development of new tools and frameworks that enable security analysts to identify, analyze, and respond to threats more effectively. The use of artificial intelligence, machine learning, and data visualization is becoming increasingly prevalent in cybersecurity research. Additionally, there is a growing focus on digital sovereignty and the need for organizations to protect their sensitive assets against unauthorized access and cyber threats. Noteworthy papers in this area include: A Cyber-Twin Based Honeypot for Gathering Threat Intelligence, which presents a novel approach to gathering threat intelligence using a cyber twin of a water treatment plant. Bridging Threat Models and Detections: Formal Verification via CADP, which introduces a formal verification framework for threat detection systems. Digital Sovereignty Control Framework for Military AI-based Cyber Security, which proposes a framework for ensuring digital sovereignty in military organizations.

Sources

Enhancing Cyber Threat Hunting -- A Visual Approach with the Forensic Visualization Toolkit

A Cyber-Twin Based Honeypot for Gathering Threat Intelligence

GView: A Survey of Binary Forensics via Visual, Semantic, and AI-Enhanced Analysis

Bridging Threat Models and Detections: Formal Verification via CADP

Digital Sovereignty Control Framework for Military AI-based Cyber Security

Built with on top of