Get a Pentest and security assessment of your IT network.

News

Sharing Threat Intelligence: Time for an Overhaul

Most organizations don t really have a good way of sharing threat-related data outside of their own industry verticals. To build better defenses, it s time to take a broader view beyond the ISAC. Cloud-based security controls that can be applied uniformly across these organizations, with the goal of cooperatively sharing in gathering in the gathering of threat-based indicators of compromise (IoCs) and attacker TTPs. Global visibility is required for more accurate identification of threats, which would require a different sort of cooperation, amongst those who provide internet networks.

Source: https://threatpost.com/threat-intelligence-overhaul/144906/

Related posts
News

Ashley Madison 2.0 Hackers Leak 20GB Data Dump, Including CEO's Emails

News

Art of Twitter account hacking

News

Reflection of cyber-attack to Wells Fargo in world media

News

CVE-2016-6563 RCE flaw affects D-Link Routers, disable remote admin