From 4e16afdb260426a739c2470cc41fa09c4302bb58 Mon Sep 17 00:00:00 2001 From: Herman Slatman Date: Tue, 28 Feb 2017 22:50:19 +0100 Subject: [PATCH 1/2] Add the WI2017 paper on Threat Intelligence Sharing Platforms --- README.md | 8 ++++++++ 1 file changed, 8 insertions(+) diff --git a/README.md b/README.md index 336efa2..c1f3027 100644 --- a/README.md +++ b/README.md @@ -1234,6 +1234,14 @@ All kinds of reading material about Threat Intelligence. Includes (scientific) r This report by MWR InfoSecurity clearly describes several diffent types of threat intelligence, including strategic, tactical and operational variations. It also discusses the processes of requirements elicitation, collection, analysis, production and evaluation of threat intelligence. Also included are some quick wins and a maturity model for each of the types of threat intelligence defined by MWR InfoSecurity. + + + Threat Intelligence Sharing Platforms: An Exploratory Study of Software Vendors and Research Perspectives + + + A systematic study of 22 Threat Intelligence Sharing Platforms surfacing eight key findings about the gap between existing products and what properties a product should have. + + Traffic Light Protocol From 22814b38c9bfc47397c34d829d9c43375c82509e Mon Sep 17 00:00:00 2001 From: Herman Slatman Date: Tue, 28 Feb 2017 23:06:17 +0100 Subject: [PATCH 2/2] Reword the description for the TISPs paper --- README.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/README.md b/README.md index c1f3027..8bd5566 100644 --- a/README.md +++ b/README.md @@ -1239,7 +1239,7 @@ All kinds of reading material about Threat Intelligence. Includes (scientific) r Threat Intelligence Sharing Platforms: An Exploratory Study of Software Vendors and Research Perspectives - A systematic study of 22 Threat Intelligence Sharing Platforms surfacing eight key findings about the gap between existing products and what properties a product should have. + A systematic study of 22 Threat Intelligence Sharing Platforms (TISP) surfacing eight key findings about the current state of threat intelligence usage, its definition and TISPs.