Get a Pentest and security assessment of your IT network.

Cyber Security

Sharing Threat Intelligence: Time for an Overhaul

Most organizations don t really have a good way of sharing threat-related data outside of their own industry verticals. To build better defenses, it s time to take a broader view beyond the ISAC. Cloud-based security controls that can be applied uniformly across these organizations, with the goal of cooperatively sharing in gathering in the gathering of threat-based indicators of compromise (IoCs) and attacker TTPs. Global visibility is required for more accurate identification of threats, which would require a different sort of cooperation, amongst those who provide internet networks.

Source: https://threatpost.com/threat-intelligence-overhaul/144906/

Related posts
Cyber Security

Ashley Madison 2.0 Hackers Leak 20GB Data Dump, Including CEO's Emails

Cyber Security

Art of Twitter account hacking

Cyber Security

Alexa Eavesdropping Flub Re-Sparks Voice Assistant Privacy Debate

Cyber Security

Dan Geer, Richard Thieme on specialization in security