Enhance cybersecurity awareness and survivability for DoD, industry partners, and academia in the face of the ever-increasing threat of cyber attacks. Cybersecurity (CS) includes managing risks related to the use, processing, storage, and transmission of information and the systems and processes used for those purposes, including analog and physical form. CS includes information availability, identification and authentication, confidentiality, integrity, and non-repudiation as well as the economic considerations with respect to selection of CS techniques, CS processes, and industry trends.
Making Use of Cyber Threat Intelligence
- This topic has 1 reply, 1 voice, and was last updated 1 year, 1 month ago by .
-
Topic
-
Discussions on Threat intelligence have historically been a discussion on “How ” and ” What” caused the breaches, the attacker groups, their tactics, the impacted organizations and their losses. This merely construe as Threat Information and cannot yet be classified as “Threat Intelligence”. Critically speaking, intelligence is all about future events, rather than data and Information which is purely historical in nature. Making Use of Cyber Threat Intelligence
You must be logged in to reply to this topic.