Cyber threat intelligence

Results: 83



#Item
1

Robert W. (Bob) Gordon Bob is the Executive Director, Canadian Cyber Threat Exchange (CCTX) where he has organizational responsibility to deliver cyber threat information services and lead all cyber intelligence engagem

Add to Reading List

Source URL: www.acpa-ports.net

Language: English - Date: 2018-06-27 20:37:22
    2

    S O LU T I O N S H E E T MarkMonitor Dark Web and Cyber IntelligenceTM Dark Web Threat Intelligence to Protect Against Cyberattacks

    Add to Reading List

    Source URL: www.markmonitor.com

    - Date: 2017-06-13 17:11:32
      3

      A Decentralized Cyber Threat Intelligence Market. p. 01

      Add to Reading List

      Source URL: polyswarm.io

      - Date: 2018-03-27 15:50:07
        4

        MISP Workbench - Manage your very own Cyber Threat Intelligence tool MISP - Malware Information Sharing Platform & Threat Sharing Team CIRCL http://www.misp-project.org/

        Add to Reading List

        Source URL: www.circl.lu

        - Date: 2018-03-30 09:21:42
          5

          The Protecting Cyber Networks Act: Section-By-Section Analysis Section 1: Short Title; Table of Contents. The short title of the Act is the Protecting Cyber Networks Act. Section 2: Sharing of Cyber Threat Indicators and

          Add to Reading List

          Source URL: intelligence.house.gov

          - Date: 2015-04-20 15:16:18
            6Security / Prevention / Safety / National security / Business continuity / Civil defense / Resilience / Cyberwarfare / Systemically important payment systems / Computer security / Cyber threat intelligence / Cyber-attack

            Committee on Payments and Market Infrastructures Board of the International Organization of Securities Commissions

            Add to Reading List

            Source URL: www.iosco.org

            Language: English - Date: 2016-08-16 13:52:59
            7Security / Cyberwarfare / Computer network security / Computer security / Crime prevention / National security / Cyber threat intelligence / Threat / SCADA

            Leveraging Threat Intelligence in an Active Defense 2016 Erick Mandt Intelligence Analyst

            Add to Reading List

            Source URL: files.sans.org

            Language: English - Date: 2016-07-11 10:53:35
            8Security / Prevention / Computer security / Cyberwarfare / Cybercrime / National security / Computer network security / Cyber-attack / International Multilateral Partnership Against Cyber Threats / United States Department of Homeland Security / Risk management / Cyber threat intelligence

            COMMISSION ON ENHANCING NATIONAL CYBERSECURITY Meeting of the Commission on Enhancing National Cybersecurity PANELIST STATEMENTS

            Add to Reading List

            Source URL: nist.gov

            Language: English - Date: 2016-05-16 16:29:59
            9Security / Prevention / Cyberwarfare / Computer security / National security / Computer network security / Crime prevention / Cryptography / Threat / Cyber threat intelligence / Cyber-attack / Information security

            The Importance of Cyber Threat Intelligence to a Strong Security Posture Sponsored by Webroot Independently conducted by Ponemon Institute LLC Publication Date: March 2015

            Add to Reading List

            Source URL: webroot-cms-cdn.s3.amazonaws.com

            Language: English - Date: 2016-02-25 11:51:52
            10

            Developing Cyber Threat Intelligence… or not failing in battle. AtlSecCon 2012, 02 MarchAdrien de Beaupré

            Add to Reading List

            Source URL: atlseccon.com

            Language: English - Date: 2014-12-05 18:14:42
              UPDATE