Cyber threat intelligence

Results: 83



#Item
61Structured Threat Information eXpression — STIX™ A Structured Language for Cyber Threat Intelligence Information STIX is a collaborative, community-driven effort to define and develop a structured language to represe

Structured Threat Information eXpression — STIX™ A Structured Language for Cyber Threat Intelligence Information STIX is a collaborative, community-driven effort to define and develop a structured language to represe

Add to Reading List

Source URL: makingsecuritymeasurable.mitre.org

Language: English - Date: 2013-07-08 10:01:54
62Structured Threat A Framework for Cyber Threat Intelligence stix.mitre.org What you are looking for?

Structured Threat A Framework for Cyber Threat Intelligence stix.mitre.org What you are looking for?

Add to Reading List

Source URL: makingsecuritymeasurable.mitre.org

- Date: 2013-07-08 14:41:51
    63THE SECRET TO EFFECTIVE CYBER THREAT INTELLIGENCE AND INFORMATION SHARING Sponsored by the US Department of Homeland Security

    THE SECRET TO EFFECTIVE CYBER THREAT INTELLIGENCE AND INFORMATION SHARING Sponsored by the US Department of Homeland Security

    Add to Reading List

    Source URL: stix.mitre.org

    Language: English - Date: 2013-04-23 12:09:03
    64Standardizing Cyber Threat Intelligence Information with the Structured Threat Information eXpression (STIX™) Sean Barnum

    Standardizing Cyber Threat Intelligence Information with the Structured Threat Information eXpression (STIX™) Sean Barnum

    Add to Reading List

    Source URL: stix.mitre.org

    Language: English - Date: 2014-02-20 11:24:16
    65Team Cymru Partners with Sunbelt Software to Deliver Advanced Malware Intelligence Sunbelt’s advanced automated malware analysis tools power new service for the cyber security community Clearwater, FL –November 18, 2

    Team Cymru Partners with Sunbelt Software to Deliver Advanced Malware Intelligence Sunbelt’s advanced automated malware analysis tools power new service for the cyber security community Clearwater, FL –November 18, 2

    Add to Reading List

    Source URL: www.team-cymru.org

    Language: English - Date: 2010-07-28 10:09:28
    66WHAT YOU DON’T KNOW  CAN HURT YOU. Cyber Intelligence & Response Technology (CIRT)  Eliminate Your Cyber Security Blind Spots…

    WHAT YOU DON’T KNOW CAN HURT YOU. Cyber Intelligence & Response Technology (CIRT) Eliminate Your Cyber Security Blind Spots…

    Add to Reading List

    Source URL: ad-pdf.s3.amazonaws.com

    Language: English - Date: 2014-07-12 01:05:16
    67Cyber Naïveté First Washington ignored the al Qaeda threat. Now they’re doing the same with the cyber threat. It’s time to wake up.

    Cyber Naïveté First Washington ignored the al Qaeda threat. Now they’re doing the same with the cyber threat. It’s time to wake up.

    Add to Reading List

    Source URL: wolf.house.gov

    Language: English - Date: 2014-01-03 10:07:42
    68Dynamic Threat Intelligence— Transforming Data into Intelligence Every cyber attack has a silver lining: it generates valuable new threat intelligence. This information elevates our understanding of not only the attack

    Dynamic Threat Intelligence— Transforming Data into Intelligence Every cyber attack has a silver lining: it generates valuable new threat intelligence. This information elevates our understanding of not only the attack

    Add to Reading List

    Source URL: www.fireeye.com

    Language: English - Date: 2014-08-11 22:15:26
    69Structured Threat A Framework for Cyber Threat Intelligence stix.mitre.org What you are looking for?

    Structured Threat A Framework for Cyber Threat Intelligence stix.mitre.org What you are looking for?

    Add to Reading List

    Source URL: measurablesecurity.mitre.org

    - Date: 2013-07-08 14:41:51
      70System software / Malware / Antivirus software / IOS jailbreaking / Android / Rooting / Defensive computing / Mobile business intelligence / Computing / Smartphones / Software

      From the Desk of [Insert Name Here] Is Malware a Threat to Mobile Devices? The volume of cyber threats to mobile computing devices continues to increase as new applications and devices proliferate. McAfee reports that t

      Add to Reading List

      Source URL: msisac.cisecurity.org

      Language: English - Date: 2014-05-29 06:25:24