Add the WI2017 paper on Threat Intelligence Sharing Platforms
parent
cccbe9a5dd
commit
4e16afdb26
|
@ -1234,6 +1234,14 @@ All kinds of reading material about Threat Intelligence. Includes (scientific) r
|
||||||
This report by MWR InfoSecurity clearly describes several diffent types of threat intelligence, including strategic, tactical and operational variations. It also discusses the processes of requirements elicitation, collection, analysis, production and evaluation of threat intelligence. Also included are some quick wins and a maturity model for each of the types of threat intelligence defined by MWR InfoSecurity.
|
This report by MWR InfoSecurity clearly describes several diffent types of threat intelligence, including strategic, tactical and operational variations. It also discusses the processes of requirements elicitation, collection, analysis, production and evaluation of threat intelligence. Also included are some quick wins and a maturity model for each of the types of threat intelligence defined by MWR InfoSecurity.
|
||||||
</td>
|
</td>
|
||||||
</tr>
|
</tr>
|
||||||
|
<tr>
|
||||||
|
<td>
|
||||||
|
<a href="http://aisel.aisnet.org/wi2017/track08/paper/3/" target="_blank">Threat Intelligence Sharing Platforms: An Exploratory Study of Software Vendors and Research Perspectives</a>
|
||||||
|
</td>
|
||||||
|
<td>
|
||||||
|
A systematic study of 22 Threat Intelligence Sharing Platforms surfacing eight key findings about the gap between existing products and what properties a product should have.
|
||||||
|
</td>
|
||||||
|
</tr>
|
||||||
<tr>
|
<tr>
|
||||||
<td>
|
<td>
|
||||||
<a href="https://www.us-cert.gov/tlp" target="_blank">Traffic Light Protocol</a>
|
<a href="https://www.us-cert.gov/tlp" target="_blank">Traffic Light Protocol</a>
|
||||||
|
|
Loading…
Reference in New Issue