Most organizations don t really have a good way of sharing threat-related data outside of their own industry verticals. To build better defenses, it s time to take a broader view beyond the ISAC. Cloud-based security controls that can be applied uniformly across these organizations, with the goal of cooperatively sharing in gathering in the gathering of threat-based indicators of compromise (IoCs) and attacker TTPs. Global visibility is required for more accurate identification of threats, which would require a different sort of cooperation, amongst those who provide internet networks.
Source: https://threatpost.com/threat-intelligence-overhaul/144906/

