Talk With an Expert

Cyber Breach Coaching

Cyber Breach Coaching (PDF, 2.12MB)Published: 12 Jan, 2015
Created by
Michael Hoehl

Threat Intelligence has become the 2014 security buzzword. While there are some valiant efforts to create Threat Intelligence on the open source and commercial front, the ingestion and utilization of Threat Intelligence is still a fringe science in a fragmented market. There seems to be a proliferation of products flooding the Threat Intelligence data repository market, but the meaningful integrations appear to still be lacking. This paper will describe the current environment of the Threat Intelligence industry, the areas of current research in sharing and using Threat Intelligence, as well as some potential future use cases for Threat Intelligence to further streamline the Network Security Monitoring and Incident Response processes. Lastly, some code examples should help the reader kick start a basic Threat Intelligence program.