Reading the tea leaves: A comparative analysis of threat intelligence
The term" threat intelligence" has swiftly become a staple buzzword in the computer security
industry. The entirely reasonable premise is that, by compiling up-to-date information about …
industry. The entirely reasonable premise is that, by compiling up-to-date information about …
A different cup of {TI}? the added value of commercial threat intelligence
X Bouwman, H Griffioen, J Egbers, C Doerr… - 29th USENIX security …, 2020 - usenix.org
Commercial threat intelligence is thought to provide unmatched coverage on attacker
behavior, but it is out of reach for many organizations due to its hefty price tag. This paper …
behavior, but it is out of reach for many organizations due to its hefty price tag. This paper …
Quality evaluation of cyber threat intelligence feeds
H Griffioen, T Booij, C Doerr - … , ACNS 2020, Rome, Italy, October 19–22 …, 2020 - Springer
In order to mount an effective defense, information about likely adversaries, as well as their
techniques, tactics and procedures is needed. This so-called cyber threat intelligence helps …
techniques, tactics and procedures is needed. This so-called cyber threat intelligence helps …
From cyber security information sharing to threat management
S Brown, J Gommers, O Serrano - … of the 2nd ACM workshop on …, 2015 - dl.acm.org
Across the world, organizations have teams gathering threat data to protect themselves from
incoming cyber attacks and maintain a strong cyber security posture. Teams are also …
incoming cyber attacks and maintain a strong cyber security posture. Teams are also …
Made: Security analytics for enterprise threat detection
Enterprises are targeted by various malware activities at a staggering rate. To counteract the
increased sophistication of cyber attacks, most enterprises deploy within their perimeter a …
increased sophistication of cyber attacks, most enterprises deploy within their perimeter a …
Collective threat intelligence gathering system
JC Magee, AM Andrews, MW Nicholson… - US Patent …, 2014 - Google Patents
Information networks are threatened on a daily basis with attacks from malicious computers
or software, Such as bot nets (collections of computers controlled by a central actor, used for …
or software, Such as bot nets (collections of computers controlled by a central actor, used for …
AttacKG: Constructing technique knowledge graph from cyber threat intelligence reports
Cyber attacks are becoming more sophisticated and diverse, making attack detection
increasingly challenging. To combat these attacks, security practitioners actively summarize …
increasingly challenging. To combat these attacks, security practitioners actively summarize …
Threat intelligence computing
Cyber threat hunting is the process of proactively and iteratively formulating and validating
threat hypotheses based on security-relevant observations and domain knowledge. To …
threat hypotheses based on security-relevant observations and domain knowledge. To …
[PDF][PDF] The evolution of cyber threat intelligence (cti): 2019 sans cti survey
R Brown, RM Lee - SANS Institute. Available online: https://www. sans. org …, 2019 - a51.nl
Cyber threat intelligence (CTI) analyzes information about the intent, capabilities and
opportunities of adversaries in cyberspace, making it a valuable resource for organizations …
opportunities of adversaries in cyberspace, making it a valuable resource for organizations …
[PDF][PDF] Threat intelligence: What it is, and how to use it effectively
M Bromiley - SANS Institute InfoSec Reading Room, 2016 - nsfocusglobal.com
In today's cyber landscape, decision makers constantly question the value of their security
investments, asking whether each dollar is helping secure the business. Meanwhile, cyber …
investments, asking whether each dollar is helping secure the business. Meanwhile, cyber …