Get a Pentest and security assessment of your IT network.

News

Sharing Threat Intelligence: Time for an Overhaul

Most organizations don t really have a good way of sharing threat-related data outside of their own industry verticals. To build better defenses, it s time to take a broader view beyond the ISAC. Cloud-based security controls that can be applied uniformly across these organizations, with the goal of cooperatively sharing in gathering in the gathering of threat-based indicators of compromise (IoCs) and attacker TTPs. Global visibility is required for more accurate identification of threats, which would require a different sort of cooperation, amongst those who provide internet networks.

Source: https://threatpost.com/threat-intelligence-overhaul/144906/

Related posts
News

Ashley Madison 2.0 Hackers Leak 20GB Data Dump, Including CEO's Emails

News

Art of Twitter account hacking

News

FBI director floats international framework on access to encrypted data

News

The 'Disappearance' of Keith Alexander