Weaponising threat intelligence data

التفاصيل البيبلوغرافية
العنوان: Weaponising threat intelligence data
المؤلفون: Tom Major
المصدر: Network Security. 2017:11-13
بيانات النشر: Mark Allen Group, 2017.
سنة النشر: 2017
مصطلحات موضوعية: Information Systems and Management, Computer Networks and Communications, media_common.quotation_subject, Business ecosystem, Computer security, computer.software_genre, Track (rail transport), Threat intelligence, Malware, Business, Line (text file), Safety, Risk, Reliability and Quality, computer, Reputation, media_common, Pace
الوصف: In a world built on a hyper-connected business ecosystem, a breach in any area of that system can have a significant impact on a company's bottom line and – what's worse – damage its reputation. This can be seen in the recent headlines on major cyber-attacks spreading across countries and heavily impacting organisations we all rely on. The desire for access to company data is leading to a surge in increasingly sophisticated cyber-attacks. And the quantity of threat data being generated means the normal methods of observing and reporting can no longer keep pace. To fend off cyber-criminals, organisations need to be able to spot certain behaviours and characteristics that attackers exhibit when planning an attack. As the industry continues to refine predictive cyber-security tools, our ability to track malware and hone in on cyber-criminals' movements will become even more effective at stopping cyber-attacks, argues Tom Major of Level 3 Communications.
تدمد: 1353-4858
URL الوصول: https://explore.openaire.eu/search/publication?articleId=doi_________::a43c2b3cc019ffcc8ef6d3151851de31
https://doi.org/10.1016/s1353-4858(17)30082-x
حقوق: CLOSED
رقم الأكسشن: edsair.doi...........a43c2b3cc019ffcc8ef6d3151851de31
قاعدة البيانات: OpenAIRE