Cyber threat intelligence

Results: 83



#Item
61Security / Electronic warfare / Military technology / National security / STIX Fonts project / Vulnerability / Hacking / Cyberwarfare / Computer security

Structured Threat Information eXpression — STIX™ A Structured Language for Cyber Threat Intelligence Information STIX is a collaborative, community-driven effort to define and develop a structured language to represe

Add to Reading List

Source URL: makingsecuritymeasurable.mitre.org

Language: English - Date: 2013-07-08 10:01:54
62

Structured Threat A Framework for Cyber Threat Intelligence stix.mitre.org What you are looking for?

Add to Reading List

Source URL: makingsecuritymeasurable.mitre.org

- Date: 2013-07-08 14:41:51
    63United States Department of Defense / Computer security / Mitre Corporation / Mitre / Threat / STIX Fonts project / Clothing / Christianity / Christian clothing

    THE SECRET TO EFFECTIVE CYBER THREAT INTELLIGENCE AND INFORMATION SHARING Sponsored by the US Department of Homeland Security

    Add to Reading List

    Source URL: stix.mitre.org

    Language: English - Date: 2013-04-23 12:09:03
    64Cyberwarfare / Electronic warfare / Military technology / Advanced persistent threat / International Multilateral Partnership Against Cyber Threats / Phishing / Threat / United States Computer Emergency Readiness Team / Department of Defense Cyber Crime Center / Cybercrime / Computer crimes / Computer security

    Standardizing Cyber Threat Intelligence Information with the Structured Threat Information eXpression (STIX™) Sean Barnum

    Add to Reading List

    Source URL: stix.mitre.org

    Language: English - Date: 2014-02-20 11:24:16
    65Computer network security / Rogue software / Antivirus software / Sunbelt Software / Rogue security software / Counterspy / Spyware / Vulnerability / Threat / Computer security / Malware / Cyberwarfare

    Team Cymru Partners with Sunbelt Software to Deliver Advanced Malware Intelligence Sunbelt’s advanced automated malware analysis tools power new service for the cyber security community Clearwater, FL –November 18, 2

    Add to Reading List

    Source URL: www.team-cymru.org

    Language: English - Date: 2010-07-28 10:09:28
    66Antivirus software / Malware / Network security / Computing / Threat / Packet capture / Computer network security / Computer security / Cyberwarfare

    WHAT YOU DON’T KNOW CAN HURT YOU. Cyber Intelligence & Response Technology (CIRT) Eliminate Your Cyber Security Blind Spots…

    Add to Reading List

    Source URL: ad-pdf.s3.amazonaws.com

    Language: English - Date: 2014-07-12 01:05:16
    67National security / Hacking / Electronic warfare / Espionage / Industrial espionage / United States Cyber Command / Cyber spying / Computer security / Chinese intelligence operations in the United States / Cyberwarfare / Security / Cybercrime

    Cyber Naïveté First Washington ignored the al Qaeda threat. Now they’re doing the same with the cyber threat. It’s time to wake up.

    Add to Reading List

    Source URL: wolf.house.gov

    Language: English - Date: 2014-01-03 10:07:42
    68Cyberwarfare / FireEye /  Inc. / Cloud computing / Threat / Defense Intelligence Agency / Advanced persistent threat / Malware / Multi-agent systems / Computer security / Computing / Computer network security

    Dynamic Threat Intelligence— Transforming Data into Intelligence Every cyber attack has a silver lining: it generates valuable new threat intelligence. This information elevates our understanding of not only the attack

    Add to Reading List

    Source URL: www.fireeye.com

    Language: English - Date: 2014-08-11 22:15:26
    69

    Structured Threat A Framework for Cyber Threat Intelligence stix.mitre.org What you are looking for?

    Add to Reading List

    Source URL: measurablesecurity.mitre.org

    - Date: 2013-07-08 14:41:51
      70System software / Malware / Antivirus software / IOS jailbreaking / Android / Rooting / Defensive computing / Mobile business intelligence / Computing / Smartphones / Software

      From the Desk of [Insert Name Here] Is Malware a Threat to Mobile Devices? The volume of cyber threats to mobile computing devices continues to increase as new applications and devices proliferate. McAfee reports that t

      Add to Reading List

      Source URL: msisac.cisecurity.org

      Language: English - Date: 2014-05-29 06:25:24
      UPDATE