I am currently researching an in-depth article looking at the role of OSINT in information security.
The piece will look at how OSINT fits into other forms of intelligence security teams can use to monitor, track, and counter threats.
We’ll look at the various types of open source data, and how they are used. The piece will then drill down into common OSINT tools, from vendors and individual researchers.
And it will examine how they fit in with the other tools and techniques pen testers, white hats and security response teams have to counter threats.
I am keen to hear from pen testers and CISOs, but also other experts who know the space, especially if they have direct, hands-on experience of recon and intel tools in the enterprise or public sector. I can, however, include vendor comment.
Suggestions for leads, by email in the first instance, no later than 1700hrs Friday 6th November (the piece will be written the following week).