Security News > 2017 > July > Five Steps to Turn Threat Intelligence into a Threat Operations Program (Security Week)

2017-07-13 12:45
Last month at the Gartner Security and Risk Management conference, I had the opportunity to speak with many CISOs, analysts and other security professionals. One of the common threads through many of these conversations was how to use threat intelligence more effectively to understand and act upon the highest priority threats facing their organizations. They have acquired multiple data feeds from multiple sources, but without the ability to sift through the data it has just become noise. read more
News URL
Related news
- Inconsistent security strategies fuel third-party threats (source)
- Man vs. machine: Striking the perfect balance in threat intelligence (source)
- AI threats and workforce shortages put pressure on security leaders (source)
- 5 Identity Threat Detection & Response Must-Haves for Super SaaS Security (source)