Stingar-An Approach to Creating and Sharing Threat Intelligence

dc.contributor.authorBiever, Richard
dc.contributor.authorKaur, Gagan
dc.contributor.authorMerck, Alexander
dc.date.accessioned2021-08-19T20:58:53Z
dc.date.available2021-08-19T20:58:53Z
dc.date.issued2021-08
dc.description.abstractAn important challenge facing security teams is how to accurately and rapidly identify and block attacks. Security teams make use of broad toolkits to defend networks, systems, and data such as antimalware software, anti-phishing appliances, and intrusion protection and detection devices. In more recent years, threat intelligence has played an increasingly important role in protecting the enterprise. Three trends are clear in the evolving security environment: 1. Near-real-time intelligence and data about attacks has incredible value. 2. Due to the ever-increasing capacity and speed of networks, automated detection and response is no longer a “nice to have,” but a “must have.” 3. The ability to share actionable threat intelligence or attack information between trusted partners can improve collective defensive capabilities at scale.en
dc.identifier.urihttps://hdl.handle.net/2022/26735
dc.language.isoenen
dc.rights.urihttps://creativecommons.org/licenses/by/4.0/en
dc.titleStingar-An Approach to Creating and Sharing Threat Intelligenceen
dc.typeTechnical Reporten

Files

Original bundle

Now showing 1 - 1 of 1
No Thumbnail Available
Name:
STINGAR - An approach to creating and sharing threat intelligence.docx
Size:
881.28 KB
Format:
Microsoft Word XML
Description:
Can’t use the file because of accessibility barriers? Contact us with the title of the item, permanent link, and specifics of your accommodation need.