Browsing by Author "Biever, Richard"
Now showing 1 - 2 of 2
- Results Per Page
- Sort Options
Item SDN and IDM Integration Duke - The Implementation of a Protected Research and Data Network and the Road to SDN (A CCoE Webinar Presentation)(2017-03-27) Biever, Richard; Kneifel, CharleyItem Stingar-An Approach to Creating and Sharing Threat Intelligence(2021-08) Biever, Richard; Kaur, Gagan; Merck, AlexanderAn important challenge facing security teams is how to accurately and rapidly identify and block attacks. Security teams make use of broad toolkits to defend networks, systems, and data such as antimalware software, anti-phishing appliances, and intrusion protection and detection devices. In more recent years, threat intelligence has played an increasingly important role in protecting the enterprise. Three trends are clear in the evolving security environment: 1. Near-real-time intelligence and data about attacks has incredible value. 2. Due to the ever-increasing capacity and speed of networks, automated detection and response is no longer a “nice to have,” but a “must have.” 3. The ability to share actionable threat intelligence or attack information between trusted partners can improve collective defensive capabilities at scale.