<?xml version="1.0" encoding="UTF-8"?><rss xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:atom="http://www.w3.org/2005/Atom" version="2.0" xmlns:itunes="http://www.itunes.com/dtds/podcast-1.0.dtd" xmlns:googleplay="http://www.google.com/schemas/play-podcasts/1.0"><channel><title><![CDATA[The Analyst Mind]]></title><description><![CDATA[How analysts think through chaos — critical thinking, threat detection, and AI-augmented defence for security practitioners protecting critical infrastructure to the convergence of cyber and physical security]]></description><link>https://www.theanalystmind.io</link><image><url>https://substackcdn.com/image/fetch/$s_!2h1T!,w_256,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9b9b512c-fbc2-4f4e-bca6-93de9c92d1a9_64x64.png</url><title>The Analyst Mind</title><link>https://www.theanalystmind.io</link></image><generator>Substack</generator><lastBuildDate>Thu, 23 Apr 2026 08:32:41 GMT</lastBuildDate><atom:link href="https://www.theanalystmind.io/feed" rel="self" type="application/rss+xml"/><copyright><![CDATA[Klaus Wunder]]></copyright><language><![CDATA[en]]></language><webMaster><![CDATA[theanalystmind@substack.com]]></webMaster><itunes:owner><itunes:email><![CDATA[theanalystmind@substack.com]]></itunes:email><itunes:name><![CDATA[Klaus Wunder]]></itunes:name></itunes:owner><itunes:author><![CDATA[Klaus Wunder]]></itunes:author><googleplay:owner><![CDATA[theanalystmind@substack.com]]></googleplay:owner><googleplay:email><![CDATA[theanalystmind@substack.com]]></googleplay:email><googleplay:author><![CDATA[Klaus Wunder]]></googleplay:author><itunes:block><![CDATA[Yes]]></itunes:block><item><title><![CDATA[The 5W+H Questions]]></title><description><![CDATA[Structuring Your Thinking From Minute One]]></description><link>https://www.theanalystmind.io/p/the-5wh-questions</link><guid isPermaLink="false">https://www.theanalystmind.io/p/the-5wh-questions</guid><dc:creator><![CDATA[Klaus Wunder]]></dc:creator><pubDate>Sun, 29 Mar 2026 20:23:31 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!hqiL!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F29b05679-afec-4408-858b-ccb596f4a887_1200x720.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>You are sixty seconds into an investigation. The alert fired. The ticket is open. The clock is running.</p><p>Most analysts do the same thing: they dive, straight into the logs, straight into the tool stack, straight into whatever data is closest. No structure. No sequence. Just motion.</p><p>Motion feels productive. It is not the same as progress.</p><p>The problem is not speed. The problem is that without a framework for what to ask first, the investigation is shaped by whatever data happens to land in front of you. The first log entry anchors your thinking. The first IOC becomes the theory. And from there, you are not investigating, you are confirming.</p><p>If you read the first post in this series, you recognise that pattern. Anchoring bias meets confirmation bias, sixty seconds in, before the analyst even knows it is happening.</p><p>There is a countermeasure. It is old. It is simple. It works:</p><h2>Six Questions, One Framework</h2><p>Who. What. When. Where. Why. How.</p><p>The 5W+H framework has been used in journalism, military intelligence, and law enforcement for decades. It is not clever. It is not novel. That is the point. Its value is that it forces completeness before it allows depth.</p><p>When you open an investigation with the 5W+H questions, you are not solving yet. You are mapping. You are building the landscape of the problem before you pick a direction to walk.</p><ul><li><p><strong>Who</strong> is affected? Who triggered the alert? Who owns the asset? Who else might be involved?</p></li><li><p><strong>What</strong> happened? What did the detection actually fire on? What is the observable behaviour, stripped of the tool&#8217;s interpretation?</p></li><li><p><strong>When</strong> did it start? When was it detected? Is there a gap between those two? What was happening in that gap?</p></li><li><p><strong>Where</strong> in the environment? Which system, which network segment, which cloud tenant? Where does this asset sit in your architecture, and what can it reach?</p></li><li><p><strong>Why</strong> does this matter? Why would an attacker target this? Why now? Or why might this be benign?</p></li><li><p><strong>How</strong> did it happen? How did the activity occur technically? How was access gained, or how was the process initiated?</p></li></ul><p>None of these questions are hard. All of them are missed &#8212; routinely &#8212; when analysts skip straight to hypothesis.</p><h2>The Blank Page Problem</h2><p>Here is where it gets practical.</p><p>One of the biggest friction points in investigation work is the blank page. A ticket opens. The analyst stares at an empty notes field and a pile of raw telemetry. Where do you even start?</p><p>This is where automation earns its place, not as a replacement for the analyst, but as a pre-fill for the obvious.</p><p>A well-configured SOAR playbook, enrichment pipeline, or even an LLM integration can answer a significant portion of the 5W+H  questions before the analyst touches the case. The factual, contextual baseline: Who is this user? What is their role? What asset is this? Where does it sit in the network? When did the alert fire, and what is the detection logic behind it? What does the raw event look like?</p><p>That pre-fill is valuable. It eliminates the blank page. It gives the analyst a starting point that is structured, not random. Instead of diving into logs with no direction, the analyst opens a case and sees a partially completed 5W+H matrix, a map with some terrain already sketched in.</p><p>This is the kind of work automation was built for. Gathering context. Correlating identifiers. Pulling asset data and user profiles. Fast, repeatable, boring. Exactly the tasks that should not consume analyst time.</p><p>But here is the part that matters more than the efficiency gain.</p><h2>The Answers Are Not Settled</h2><p>The pre-filled 5W+H is a starting point. It is not the investigation. Every line is a premise to question, not a fact to accept.</p><p>The moment you treat the automated answers as settled, you have swapped one blind spot for another, a page so complete it stops you from asking the questions that matter.</p><p>Think about what happens. Automation says the &#8220;Who&#8221; is a specific user. The analyst accepts that and moves on. But what if the account was compromised? Then the &#8220;Who&#8221; is not the user &#8212; it is an attacker using stolen credentials. The initial answer was technically correct (this is the account) and operationally misleading (this is not the person).</p><p>The &#8220;What&#8221; might say &#8220;suspicious login from unusual location.&#8221; That is the alert summary. But the actual &#8220;What&#8221; might be the third step in a multi-stage intrusion that started days earlier. The alert is not the event &#8212; it is the symptom that finally crossed a detection threshold.</p><p>Military intelligence analysts are trained to challenge their own assessments as rigorously as they build them. The 5W+H framework operates the same way. Each question is asked at least twice: once to establish the baseline, and again as the investigation develops to test whether the baseline still holds.</p><p>This is where you earn your value. Not in gathering the initial facts, automation handles that. In asking the second-order questions that automation cannot reach.</p><p><strong>Who</strong> &#8212; beyond the account name, who actually performed this action? Is there evidence of shared credentials, compromised tokens, delegated access?</p><p><strong>What</strong> &#8212; beyond the alert description, what is the full sequence of activity? What happened before and after the detection? What did the attacker do that the detection did <em>not</em> catch?</p><p><strong>Why</strong> &#8212; beyond &#8220;it looked suspicious,&#8221; why would an attacker choose this path? What is the strategic value of this asset, this account, this timing? Or, what benign explanation accounts for all the evidence, not just most of it?</p><p>These are judgment questions. They require context that no enrichment pipeline carries: knowledge of the business, understanding of the environment&#8217;s normal patterns, awareness of what happened last week and what is planned for next week. The analyst brings this. The tool does not.</p><h2>A Bias Check Built Into the Structure</h2><p>There is a second benefit to the 5W+H framework that goes beyond investigation efficiency.</p><p>The structure itself is a bias countermeasure.</p><p>When you force yourself to answer all six questions &#8212; not just the ones that feel relevant &#8212; you are resisting the pull of confirmation bias. Your hypothesis might explain the What and the How beautifully. But can it explain the When? Does the timing actually make sense? And the Where, does the affected system fit the theory, or did you quietly ignore that the activity originated from a segment that contradicts your hypothesis?</p><p>The 5W+H questions create a completeness check. They make the gaps visible. And gaps &#8212; missing answers, questions you cannot explain &#8212; are often more diagnostic than the data you have.</p><p>The questions you cannot answer tell you more than the ones you can.</p><p>This is why the framework matters even for experienced analysts who think they do not need a checklist. Especially for experienced analysts. Experience builds pattern recognition, but it also builds assumptions. The 5W+H framework forces those assumptions into the open where they can be examined.</p><p>Combine this with a habit from earlier in this series. The deliberate pause: that moment before closure where you stop confirming and start challenging. Before you close the case, revisit each 5W+H. Has the answer changed since the investigation started? If your final &#8220;Who&#8221; is the same as your initial &#8220;Who&#8221;, are you confident because you verified it, or because you never questioned it?</p><h2>The Handoff Model</h2><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!hqiL!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F29b05679-afec-4408-858b-ccb596f4a887_1200x720.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!hqiL!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F29b05679-afec-4408-858b-ccb596f4a887_1200x720.png 424w, https://substackcdn.com/image/fetch/$s_!hqiL!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F29b05679-afec-4408-858b-ccb596f4a887_1200x720.png 848w, https://substackcdn.com/image/fetch/$s_!hqiL!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F29b05679-afec-4408-858b-ccb596f4a887_1200x720.png 1272w, https://substackcdn.com/image/fetch/$s_!hqiL!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F29b05679-afec-4408-858b-ccb596f4a887_1200x720.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!hqiL!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F29b05679-afec-4408-858b-ccb596f4a887_1200x720.png" width="1200" height="720" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/29b05679-afec-4408-858b-ccb596f4a887_1200x720.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:720,&quot;width&quot;:1200,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:547729,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://www.theanalystmind.io/i/192454779?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F29b05679-afec-4408-858b-ccb596f4a887_1200x720.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!hqiL!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F29b05679-afec-4408-858b-ccb596f4a887_1200x720.png 424w, https://substackcdn.com/image/fetch/$s_!hqiL!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F29b05679-afec-4408-858b-ccb596f4a887_1200x720.png 848w, https://substackcdn.com/image/fetch/$s_!hqiL!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F29b05679-afec-4408-858b-ccb596f4a887_1200x720.png 1272w, https://substackcdn.com/image/fetch/$s_!hqiL!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F29b05679-afec-4408-858b-ccb596f4a887_1200x720.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>So the practical model looks like this:</p><p><strong>Layer 1 Automation</strong>: Pre-fill the 5W+H matrix with factual, contextual data. User identity, asset information, alert metadata, geolocation, network context, related recent alerts. Fast. Structured. Consistent across every case.</p><p><strong>Layer 2 Analyst baseline review</strong>: Read the pre-fill. Your first question is not &#8220;does this look right?&#8221; Your first question is: <strong>what assumptions are embedded in these answers?</strong> What does the automation not know? What is missing? Flag anything that feels incomplete and flag anything that feels too clean.</p><p><strong>Layer 3 Analyst deep investigation</strong>: Pursue the second-order W questions. Test whether the initial answers survive scrutiny. Build competing explanations. Look for what the automation could not see: intent, context, strategic meaning, absence of expected evidence.</p><p><strong>Layer 4 Bias check</strong>: Before closing, walk the full 5W+H one final time. Compare your final answers to the initial pre-fill. Where they differ, you learned something. Where they match, verify that you actually confirmed them, rather than simply never challenged them.</p><p>This is not a workflow diagram for a SOAR platform. It is a thinking model. The automation handles the context gathering so the analyst can focus on the cognition. That is the division of labour that actually works.</p><h2>What Comes Next</h2><p>The 5W+H framework gives you a structure for the first minutes. But an investigation is more than its opening. In the next post, we will tie everything together &#8212; the bias countermeasures, the reasoning chain, the 5W+H questions &#8212; into a full investigation template. A single, practical document that carries you from alert to closure with structured thinking at every stage.</p><p>The tools will change. The thinking compounds.</p>]]></content:encoded></item><item><title><![CDATA[Blind Spots in the SOC: Four Cognitive Biases That Make Analysts Miss What Matters]]></title><description><![CDATA[Why smart analysts reach wrong conclusions, and how to catch yourself]]></description><link>https://www.theanalystmind.io/p/blind-spots-in-the-soc-four-cognitive</link><guid isPermaLink="false">https://www.theanalystmind.io/p/blind-spots-in-the-soc-four-cognitive</guid><dc:creator><![CDATA[Klaus Wunder]]></dc:creator><pubDate>Mon, 09 Mar 2026 18:38:41 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!rRxi!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd3538259-caa6-4510-a8b5-e2e77e79d562_1200x780.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<h2><strong>Your brain is working against you.</strong></h2><p>Not because you are a bad analyst. Not because you lack training or tools. But because you are human, and human brains take shortcuts. Those shortcuts kept our ancestors alive when a rustling bush might be a predator. In a SOC during an active incident, those same shortcuts make you miss things.</p><p>Cognitive biases are not personal flaws. They are features of how the human brain processes information under time pressure, uncertainty, and cognitive load. In cybersecurity, we rarely talk about this. We talk about tools, detections, frameworks, and playbooks. But we almost never talk about the human operating all of it.</p><p>This is part one of a series. Todays focus: The four biases I see hit SOC analysts the hardest, with real-world examples and practical ways to counter each one.</p><p></p><h2><strong>Confirmation Bias: Seeing What You Expect to See</strong></h2><p>You are investigating a suspicious authentication alert. Early in the triage, you find one indicator matching a known APT group. Your brain locks in: this is APT activity.</p><p>From that moment, everything you see gets filtered through that lens. Log entries that support the theory. Evidence. Log entries that contradict it. Noise, probably unrelated. You stop looking for alternative explanations because you already have one that fits.</p><p>The problem is that &#8220;fits&#8221; is not the same as &#8220;correct.&#8221; While you were building your APT case, you missed the data exfiltration that started three days before the alert fired. You missed it because you were not looking for it. You were looking for confirmation.</p><p>This is confirmation bias. The tendency to search for, interpret, and remember information that supports what you already believe, while ignoring or dismissing what contradicts it.</p><p><strong>How to counter it:</strong> Before closing any case, ask yourself one question: &#8220;What evidence would prove me wrong, and have I looked for it?&#8221; If you cannot answer that, your investigation is not finished. In my training sessions, I teach the Analysis of Competing Hypotheses method. You must generate at least two competing explanations before settling on one. If you only have one theory, you do not have an investigation. You have a confirmation exercise.</p><h2><strong>Anchoring Bias: The First Data Point Wins</strong></h2><p>The SIEM flags an alert as &#8220;Critical.&#8221; You open the ticket, and before you have looked at a single log, your brain has already decided this is serious. That severity label has become your anchor.</p><p>Now everything you investigate gets measured against that anchor. Lower-severity alerts in the same timeframe? They seem less important by comparison. You deprioritize them. But the real initial access was buried in one of those lower-severity alerts three entries earlier. You missed it because the first thing you saw shaped everything that followed.</p><p>Anchoring bias is the tendency to rely too heavily on the first piece of information you encounter. That first data point, whether it is a severity score, an alert title, a colleague&#8217;s opinion, or the first IOC you find, it disproportionately influences every judgment that follows.</p><p><strong>How to counter it:</strong> Always ask: &#8220;What if my first data point is wrong?&#8221; Start from the raw evidence, not from labels or scores. When investigating an alert chain, deliberately examine the full sequence rather than focusing on whichever alert triggered first. One technique I use in training: ban actor names and malware names from ticket titles. The moment you write &#8220;APT29 Investigation&#8221; at the top of your ticket, every analyst who touches it is anchored before they read a single log line.</p><h2><strong>Availability Bias: Recent Experience Distorts Your Judgment</strong></h2><p>Your team spent last week responding to a ransomware incident. It was painful, visible, and everyone remembers it. This week, an alert fires showing unusual file encryption activity on a server. Your gut says ransomware. It feels obvious.</p><p>But &#8220;feels obvious&#8221; is not analysis. What you are actually experiencing is availability bias, that is the tendency to judge the likelihood of something based on how easily examples come to mind, rather than on actual base rates.</p><p>Because ransomware is fresh in your memory, your brain overestimates the probability that this new alert is also ransomware. Meanwhile, the actual cause &#8212; a backup process using encryption that was recently reconfigured &#8212; gets overlooked because you are preconditioned. </p><p>This works in the other direction too. A high-profile APT campaign hits the news, and suddenly every lateral movement alert in your environment feels like nation-state activity. The base rate for nation-state attacks against your organization has not changed. But your perception of the risk has.</p><p><strong>How to counter it:</strong> Check base rates. What does the monitoring in your environment actually show? Use historical data, not recent memory. When you catch yourself thinking &#8220;this looks just like last week,&#8221; pause and ask: &#8220;How common is this attack type in our environment, based on data, not based on what I remember?&#8221;</p><h2>Automation Bias: Trusting the Tool Over Your Own Judgment</h2><p>The EDR scans the endpoint. "No malware detected." The SOAR enrichment comes back clean. The risk score says "Low."</p><p>You see all of this. Something about the alert still feels off &#8212; maybe the timing, maybe the process chain. But the tools say it is clean. So you close the ticket and move on.</p><p>That is automation bias. Not the tool auto-closing the ticket without you seeing it. You closing the ticket because the tool told you it was fine, even though your instinct said otherwise.</p><p>The analyst is still in the loop. The analyst still makes the decision. But the decision is shaped by the tool&#8217;s verdict rather than by independent analysis. The tool becomes the authority, and the analyst becomes the one who clicks &#8220;close.&#8221;</p><p>This bias is going to get worse as LLMs enter the analyst workflow. An AI-generated investigation summary sounds confident and well-structured even when it is wrong. If you do not have the skills to critically evaluate that output, you have a bigger problem than alert fatigue.</p><p><strong>How to counter it:</strong> Trust but verify. Build a habit of spot-checking automated verdicts. When a tool gives you a clean bill of health, ask yourself: &#8220;What would I decide if the tool did not exist?&#8221; If you cannot answer that, you are not augmenting your analysis with automation ,  you are replacing your analysis with automation.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!rRxi!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd3538259-caa6-4510-a8b5-e2e77e79d562_1200x780.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!rRxi!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd3538259-caa6-4510-a8b5-e2e77e79d562_1200x780.png 424w, https://substackcdn.com/image/fetch/$s_!rRxi!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd3538259-caa6-4510-a8b5-e2e77e79d562_1200x780.png 848w, https://substackcdn.com/image/fetch/$s_!rRxi!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd3538259-caa6-4510-a8b5-e2e77e79d562_1200x780.png 1272w, https://substackcdn.com/image/fetch/$s_!rRxi!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd3538259-caa6-4510-a8b5-e2e77e79d562_1200x780.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!rRxi!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd3538259-caa6-4510-a8b5-e2e77e79d562_1200x780.png" width="1200" height="780" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/d3538259-caa6-4510-a8b5-e2e77e79d562_1200x780.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:780,&quot;width&quot;:1200,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:545986,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://www.theanalystmind.io/i/190399606?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd3538259-caa6-4510-a8b5-e2e77e79d562_1200x780.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!rRxi!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd3538259-caa6-4510-a8b5-e2e77e79d562_1200x780.png 424w, https://substackcdn.com/image/fetch/$s_!rRxi!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd3538259-caa6-4510-a8b5-e2e77e79d562_1200x780.png 848w, https://substackcdn.com/image/fetch/$s_!rRxi!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd3538259-caa6-4510-a8b5-e2e77e79d562_1200x780.png 1272w, https://substackcdn.com/image/fetch/$s_!rRxi!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd3538259-caa6-4510-a8b5-e2e77e79d562_1200x780.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><h2><strong>What&#8217;s Next</strong></h2><p>These four biases are not the full picture. They are the ones I see most often in SOC environments. Knowing they exist is the first step. But awareness alone does not fix the problem,  you need practical tools to fight them in real time.</p><p>In the next article, I will cover the W questions that structure your thinking from the first minute of an investigation. Continuing we build the full investigation template that ties it all together.</p><p>Remember: <strong>Biases are not something you fix once. They are something you manage every day.</strong></p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.theanalystmind.io/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe now&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://www.theanalystmind.io/subscribe?"><span>Subscribe now</span></a></p><p></p>]]></content:encoded></item><item><title><![CDATA[What cybersecurity can learn from military intelligence and the CIA]]></title><description><![CDATA[Critical thinking frameworks that every analyst should know]]></description><link>https://www.theanalystmind.io/p/what-cybersecurity-can-learn-from</link><guid isPermaLink="false">https://www.theanalystmind.io/p/what-cybersecurity-can-learn-from</guid><dc:creator><![CDATA[Klaus Wunder]]></dc:creator><pubDate>Fri, 27 Feb 2026 17:36:21 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!2h1T!,w_256,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9b9b512c-fbc2-4f4e-bca6-93de9c92d1a9_64x64.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>Cybersecurity has always borrowed from the military. Lockheed Martin&#8217;s Cyber Kill Chain. MITRE ATT&amp;CK, rooted in intelligence analysis methodology. Red teaming itself comes from military war gaming. The language we use every day like threat actors, campaigns, reconnaissance, exfiltration, that is military language.</p><p>We took their offensive frameworks. We took their defensive models. We took their vocabulary.</p><p>But I realized we skipped the one thing that makes all of it work: how they train their analysts to think.</p><p>Two weeks ago I posted five critical thinking habits for security analysts on LinkedIn. The response surprised me, not just the engagement, but the conversations it started. Team leads sharing what they struggle to teach. Analysts admitting they&#8217;d never been trained to think, only to follow playbooks. Career changers asking where to even begin. </p><p>It confirmed something I&#8217;ve believed for a long time: cybersecurity has a thinking problem, not a tools problem.</p><p>So I want to go deeper. Not just five habits, but the actual frameworks behind them,  where they come from, why they work, and how you can apply them starting today.</p><p><strong>The intelligence community figured this out decades ago</strong></p><p>Here&#8217;s something most security professionals don&#8217;t know: the military and intelligence community have been formally training analysts in critical thinking for over 30 years. They had to. When a wrong assessment can cost lives, you can&#8217;t afford analysts who only follow procedures.</p><p>The CIA published &#8220;Psychology of Intelligence Analysis&#8221;, a book specifically about the cognitive biases that cause analysts to reach wrong conclusions. Not technical biases. Human biases. Confirmation bias. Anchoring. Mirror imaging. The same traps that cause a SOC analyst to close a ticket too fast, because the evidence looks like something they&#8217;ve seen before.</p><p>David T. Moore, writing for the National Defense Intelligence College, published &#8220;Critical Thinking and Intelligence Analysis&#8221; which laid out a core principle: analysts must simultaneously build a logical reasoning chain AND objectively challenge their own logic. Not one or the other. Both at the same time.</p><p>This isn&#8217;t abstract philosophy. This is operational tradecraft. And it translates directly to cybersecurity.</p><p><strong>Applying this in the SOC</strong></p><p>Let me make this concrete. You get an alert: a user account is authenticating from two geographic locations within an impossible travel timeframe. </p><p>An analyst following a playbook checks the VPN logs, confirms whether the user has a travel ticket, and either escalates or closes.</p><p>An analyst using critical thinking does something different: </p><p>Purpose: what am I actually trying to determine? Not &#8220;is this a true positive&#8221; but &#8220;is this account compromised?&#8221;</p><p><strong>Assumptions</strong>: I&#8217;m assuming the geolocation data is accurate. I&#8217;m assuming the user only has one device. Am I sure about both?</p><p><strong>Information</strong>: what data do I have? What data am I missing? Are there other signals I should correlate &#8212; endpoint telemetry, email activity, privilege changes?</p><p><strong>Inferences</strong>: if this account IS compromised, what would the attacker do next? What evidence would I expect to see? If it ISN&#8217;T compromised, what benign explanations exist and what evidence supports them?</p><p><strong>Point of view</strong>: am I looking at this only from a defensive perspective? If I were the attacker, would this alert even be the real concern, or would it be a distraction?</p><p>This is the difference between an alert handler and an analyst.</p><p><strong>Why this matters more now than ever</strong></p><p>LLMs are becoming part of the analyst workflow. They&#8217;re impressive tools. But they are pattern-matching engines that generate the most probable answer, not necessarily the correct one. They sound authoritative even when they&#8217;re wrong.</p><p>If you don&#8217;t have the critical thinking skills to evaluate an LLM&#8217;s output with the same rigor you&#8217;d evaluate a suspicious process execution, you have a problem. AI amplifies the analyst, but only if the analyst has the judgment to question its conclusions.</p><p>The intelligence community understood this about their analysts decades ago. Cybersecurity is only now catching up.</p><p><strong>Where to start</strong></p><p>You don&#8217;t need a certification or a master&#8217;s degree to start thinking more critically. But if you want structured paths, the best part is that these foundational texts are available for free.</p><p>But the real starting point is simpler than any book:</p><p>The next time you investigate an alert, PAUSE. Ask yourself what you&#8217;re assuming. Consider the opposite of your first conclusion. Explain your reasoning out loud. Check whether your thinking would hold up if someone challenged every step.</p><div class="preformatted-block" data-component-name="PreformattedTextBlockToDOM"><label class="hide-text" contenteditable="false">Text within this block will maintain its original spacing when published</label><pre class="text">That pause &#8212; that moment of deliberate, structured thinking &#8212; is what separates good analysts from the ones who catch what everyone else missed.</pre></div><p>Tools change every year. Thinking compounds forever.</p><p><strong>Further reading:</strong></p><ul><li><p>Psychology of Intelligence Analysis &#8212; Richards J. Heuer Jr., CIA (free PDF):<a href="https://www.cia.gov/resources/csi/static/Pyschology-of-Intelligence-Analysis.pdf">https://www.cia.gov/resources/csi/static/Pyschology-of-Intelligence-Analysis.pdf</a></p></li><li><p>Critical Thinking and Intelligence Analysis &#8212; David T. Moore, National Defense Intelligence College (free PDF):<a href="https://apps.dtic.mil/sti/tr/pdf/ADA481702.pdf">https://apps.dtic.mil/sti/tr/pdf/ADA481702.pdf</a></p></li></ul><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://www.theanalystmind.io/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Thanks for reading The Analyst Mind! Subscribe for free to receive new posts and support my work.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div>]]></content:encoded></item><item><title><![CDATA[Why I Started The Analyst Mind]]></title><description><![CDATA[I&#8217;ve spent nearly two decades in cybersecurity.]]></description><link>https://www.theanalystmind.io/p/why-i-started-the-analyst-mind</link><guid isPermaLink="false">https://www.theanalystmind.io/p/why-i-started-the-analyst-mind</guid><dc:creator><![CDATA[Klaus Wunder]]></dc:creator><pubDate>Fri, 20 Feb 2026 23:35:23 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!tx0q!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ffbb1786d-2646-4cff-b35c-17224c8731a3_2697x1320.heic" length="0" type="image/jpeg"/><content:encoded><![CDATA[<div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!tx0q!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ffbb1786d-2646-4cff-b35c-17224c8731a3_2697x1320.heic" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!tx0q!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ffbb1786d-2646-4cff-b35c-17224c8731a3_2697x1320.heic 424w, https://substackcdn.com/image/fetch/$s_!tx0q!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ffbb1786d-2646-4cff-b35c-17224c8731a3_2697x1320.heic 848w, https://substackcdn.com/image/fetch/$s_!tx0q!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ffbb1786d-2646-4cff-b35c-17224c8731a3_2697x1320.heic 1272w, https://substackcdn.com/image/fetch/$s_!tx0q!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ffbb1786d-2646-4cff-b35c-17224c8731a3_2697x1320.heic 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!tx0q!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ffbb1786d-2646-4cff-b35c-17224c8731a3_2697x1320.heic" width="1456" height="713" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/fbb1786d-2646-4cff-b35c-17224c8731a3_2697x1320.heic&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:713,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:736743,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/heic&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:&quot;https://theanalystmind.substack.com/i/188670526?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ffbb1786d-2646-4cff-b35c-17224c8731a3_2697x1320.heic&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!tx0q!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ffbb1786d-2646-4cff-b35c-17224c8731a3_2697x1320.heic 424w, https://substackcdn.com/image/fetch/$s_!tx0q!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ffbb1786d-2646-4cff-b35c-17224c8731a3_2697x1320.heic 848w, https://substackcdn.com/image/fetch/$s_!tx0q!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ffbb1786d-2646-4cff-b35c-17224c8731a3_2697x1320.heic 1272w, https://substackcdn.com/image/fetch/$s_!tx0q!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ffbb1786d-2646-4cff-b35c-17224c8731a3_2697x1320.heic 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>I&#8217;ve spent nearly two decades in cybersecurity. Hands on networks before the cloud existed. Protecting systems where a breach doesn&#8217;t just cost data, it costs safety.</p><p>In that time, I&#8217;ve trained analysts and teams across red team, blue team, and everything in between. And one pattern keeps showing up.</p><p>The people who perform best &#8212; in exercises, during incidents, when troubleshooting at 3am &#8212; aren&#8217;t the ones with the longest cert list or the latest tools. They&#8217;re the ones who think differently.</p><p>They question before they escalate. They sit with discomfort instead of closing the ticket. They understand the why, not just the what.</p><p>That&#8217;s what this newsletter is about.</p><p>The Analyst Mind is where I share what I&#8217;ve learned from years of training, incident response, detection engineering, troubleshooting, and building secure infrastructure &#8212; not as a tool guide, but as a thinking guide. Whether you&#8217;re a SOC analyst, a sysadmin, a network engineer, or somewhere in between, the mindset is what makes the difference.</p><p>What you can expect here:</p><p>Deeper dives into the topics I post about on LinkedIn &#8212; critical thinking, offensive skills for defenders, AI in security operations, threat hunting, and incident preparedness.</p><p>Frameworks and mental models that make you better at your craft &#8212; not because you memorize more, but because you reason better.</p><p>Behind-the-scenes lessons from real training exercises, tabletop scenarios, and operational troubleshooting &#8212; what worked, what failed, and why.</p><p>My honest take on where this industry is heading &#8212; especially as AI reshapes how we work.</p><p>I started this because I believe our industry doesn&#8217;t have a tools problem. It has a thinking problem. And the people who solve that &#8212; whether they sit in a SOC, a server room, or a red team engagement &#8212; will be the ones who define the next era of security.</p><p>If that resonates, subscribe. I publish every two weeks, and I keep it practical.</p><p>Welcome to The Analyst Mind.</p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://www.theanalystmind.io/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Thanks for reading The Analyst Mind - by Klaus! Subscribe for free to receive new posts and support my work.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div>]]></content:encoded></item></channel></rss>