Threat intelligence sharing has become the “new black” in the world of enterprise security. The core of threat intelligence sharing is typically information gathered from the customer by the vendor. Some customers are asking for their organizations own threat intelligence to remain private. This leads down a path where only a select set of affluent customers receive the white security glove treatment, leaving the rest of the world to fend for themselves, says Candace Worley, senior vice president and general manager, Endpoint Security.”]

