1. This site uses cookies. By continuing to use this site, you are agreeing to our use of cookies. Learn More.

Threat intel sharing: Security breakthrough or flavor of the month?

Discussion in 'CSO' started by RSS, Jun 8, 2015.

  1. RSS

    RSS New Member Member

    Threat intelligence sharing has become the "new black" in the world of enterprise security, a trendy buzzword that has become ubiquitous at industry conferences and in vendor marketing pitches. But what exactly is threat intelligence sharing and are we using it effectively to defend against cyberattacks?

    While there are many paths available —customer-to-vendor, vendor-to-customer, customer-to-customer, vendor-to-vendor—the core of threat intelligence sharing is typically information gathered from the customer by the vendor in order to help the customer respond to threats or attacks.

    + ALSO ON NETWORK WORLD: Old school antivirus vendors learn new tricks +

    To read this article in full or to leave a comment, please click here

    Continue reading...

Share This Page