Receive occasional news and new articles from Cosive.

Thanks for subscribing to our newsletter
Oops! Something went wrong
February 21, 2024

Meet Prescott Pym, Principal Security Consultant at Cosive

In this interview, we sit down with Prescott Pym, a cybersecurity expert with over 25 years of experience in both government and enterprise sectors. Based in Canberra, Prescott has built a career around InfoSec, drawn to the dynamic challenges of the field since his early exposure to technology in the 80s. Now, as a consultant at Cosive, he helps organizations strengthen their security operations and CTI programs. Beyond his professional life, Prescott is deeply committed to his community and family, balancing a demanding career with personal growth. In this conversation, he reflects on his journey, shares insights into the cybersecurity industry, and offers advice for those looking to break into the field.

February 21, 2024

Cosive hires ex-Deloitte Prescott Pym as Principal Consultant

Security operations and cyber threat intelligence firm Cosive has appointed Prescott Pym as a Principal Security Consultant.

February 21, 2024

Using the CTI-CMM Model to Evaluate Threat Intel Program Maturity

It’s okay to admit that you don’t know exactly what CTI means. Of course, you know it stands for Cyber Threat Intelligence, and you might have a general sense it has something to do with staying on top of threats. How, though, do you actually build a successful CTI program in an organisation? What activities should it perform? What should it produce? For who?

February 21, 2024

Using MISP Bookmarks with Workflows for Team Coordination

Have you tried the Bookmarks feature in MISP yet? It’s much more powerful than you might think. Bookmarks are incredibly useful because within a team, we need to know what to take action on from all the new MISP events that come in over the last 24 hours. MISP bookmarks give us a way to save searches that help us isolate the signal from the noise. Paired with the Workflow features, they give us some powerful options to get our team on the same page.

February 21, 2024

Visualising APT threat actor and tool commonalities

How can we visualise intel about tool use between threat actors using a vis.js network visualisation? Let's add a circular twist.