Liberty91

Blog

Insights on cyber threat intelligence, AI-powered security, and staying ahead of emerging threats.

Abstract dossier or profile card with structured data visualisations and directional arrows on a deep navy background with orange accents
Industry

Threat Actor Profiling for Defenders: A Practical Framework

A practical framework for threat actor profiling that prioritises operational value over attribution — categories, profiles, and tying CTI to defence.

Abstract optical illusion with geometric shapes that appear different from different angles, deep navy background with orange and amber light
Industry

Cognitive Biases in CTI: Structured Techniques for Sharper Analysis

How confirmation bias, anchoring, and the availability heuristic distort threat intelligence — and the techniques analysts use to counteract them.

Abstract decision tree with multiple branching pathways diverging from a single point, deep navy background with orange and amber illuminated paths
Industry

Analysis of Competing Hypotheses: A Step-by-Step Guide for CTI

A step-by-step guide to Analysis of Competing Hypotheses (ACH) for cyber threat intelligence, with a worked example and matrix template.

Abstract architectural blueprint rendered in 3D, showing a structured framework being assembled from geometric components on a deep navy background
Industry

How to Build a Collection Plan in 5 Steps

Most CTI teams collect intelligence the way people grocery shop — without a list. A collection plan connects your needs to your sources.

Abstract geometric landscape with layered terrain, each layer representing a stage of refinement from raw textures to clean precise forms
Industry

A Practitioner’s Guide to the Intelligence Lifecycle

What cyber threat intelligence actually is, why most teams confuse it with information management, and what the intelligence lifecycle looks like in practice.

Abstract data streams flowing from collection nodes into analytical patterns, representing the shift from rote monitoring to true intelligence analysis
Industry

Rewriting the News Is Not Intelligence — But Someone Still Has to Do It

A CTI veteran responds to the viral Hard Cyber Threat Intel Pills image. Some pills are spot-on. Some need nuance. And one misses the real problem entirely.

Stack of open editorial reference books and hardcover volumes with orange-ink article layouts, the top book embossed with a geometric Liberty91 bull head, dramatically lit on a deep navy surface
Guide

The Top Cybersecurity and Threat Intelligence Blogs (2025 Edition)

A practitioner's guide to the cybersecurity and CTI blogs, research labs, national CERTs, and vulnerability feeds worth reading in 2025.

Cinematic hourglass on a navy desk with warm orange sand almost fully collected in the bottom chamber, a small amount still falling, a geometric Liberty91 bull head embossed on the wooden frame, dramatic side lighting
Industry

The 80/20 Problem in Cyber Threat Intelligence (and Why It’s Structural)

CTI analysts spend ~80% of their time on collection and report assembly, 20% on actual analysis. It’s a structural challenge, not a skills gap.

Leather-bound intelligence dossier with a geometric Liberty91 bull head embossed as an official seal on the cover, structured chart and matrix pages protruding from the side, dramatically side-lit on a deep navy surface
Guide

How to Build a Threat Profile: A Worked Example for Mid-Market Security Teams

A walkthrough of building a threat profile for a fictional mid-market fintech, from PIRs to TTP-level detection coverage with a one-page artefact.

Ready to do more with less?

Request a demo or start your free trial today. Get instant access to AI-powered threat intelligence tailored to your organisation.