Security News > 2017 > July > Five Steps to Turn Threat Intelligence into a Threat Operations Program (Security Week)
2017-07-13 12:45
Last month at the Gartner Security and Risk Management conference, I had the opportunity to speak with many CISOs, analysts and other security professionals. One of the common threads through many of these conversations was how to use threat intelligence more effectively to understand and act upon the highest priority threats facing their organizations. They have acquired multiple data feeds from multiple sources, but without the ability to sift through the data it has just become noise. read more
News URL
Related news
- MISP: Open-source threat intelligence and sharing platform (source)
- AI security 2024: Key insights for staying ahead of threats (source)
- IntelOwl: Open-source threat intelligence management (source)
- OpenCTI: Open-source cyber threat intelligence platform (source)
- More than 3 in 4 Tech Leaders Worry About SaaS Security Threats, New Survey Reveals (source)
- Cyber Security and IT Leadership: A Growing Threat to Australia’s Renewable Energy Efforts (source)
- Microsoft security tools questioned for treating employees as threats (source)
- Homeland security hopes to scuttle maritime cyber-threats with port infosec testbed (source)
- Apple Drops Spyware Case Against NSO Group, Citing Risk of Threat Intelligence Exposure (source)