Filter By:

Recent Blogs & Podcasts

Back to Insights

Pros and Cons of CISA’s Threat-Sharing Program

January 26, 2017 | Threat Intelligence and Modeling
By Bill Dean, IANS Faculty

With the passage of CISA and with DHS’ Automated Indicator Sharing (AIS) program getting up and running, organizations interested in sharing threat intelligence can now consider automating the process. How can they ensure their automated feed is scrubbed of PII and won’t leave them open to liability or privacy concerns? In this report, IANS Faculty Bill Dean offers tips for sharing threat indicators both automatically and safely.



Please Login to continue

Related Research

7/6/2017 | Ask-an-Expert
Take a Threat Modeling Approach to Protecting Critical IoT Infrastructure

6/28/2017 | Podcast
Mark Clancy on the Petya-like GoldenEye Attacks and Tough Choices in Enterprise Defense

6/22/2017 | Faculty Report
Beef Up Your Threat Intelligence By Leveraging Internal Success

6/14/2017 | Podcast
Jon Condra on Dark Web Threats and Nation-State Attackers