home_banner `

Content Icon

Make Sense of Your Threat Intel

April 11, 2018 | Faculty Reports | Threat Intelligence and Modeling | By Bill Dean, IANS Faculty

With all the threat feeds and intelligence sources out there, how can you choose – and use – the right ones for your specific infosec program and use cases? In this report, IANS Faculty Bill Dean offers practical tips for choosing the right feeds, integrating the data and ensuring you successfully leverage threat intel to proactively detect/prevent attacks.


Already a client?

Log In to Continue

Not a client?

Request More Information

Related Research

Using MITRE ATT&CK™ for Coverage and Effectiveness Assessments

The MITRE Adversarial Tactics, Techniques, and Common Knowledge (ATT&CK™) Framework is fast becoming the go-to model for known cyber adversary behavior, reflecting the phases of the attack lifecycle as well as commonly targeted platforms. In this webinar, TrustedSec CSO Practice Lead Rockie Brockway and TrustedSec Senior Consultant Rick Yocum walk through the framework’s components and how to put them to the best use when doing assessments in your organization.

Top Threat Intel Providers: An Overview

Who are the top vendors in the threat intel space? In this Ask-an-Expert live interaction, IANS Faculty Dave Kennedy provides a rundown of the top options, and explains the key features to look for when choosing a provider.

Cyber Attacks Represent Higher GDP Risk in North America than Globally

In North America, cyber attacks rank second among risks to the country’s gross domestic product. When the risks of 279 cities around the globe are averaged together, cyber attacks fall to seventh on the risk index.

Industrial Control Systems: Overview of Threat Intelligence Sources Used

Some 54 percent of companies are using third-party intelligence from their security vendors to gather threat intelligence on industrial control systems. Almost half (46%) participate in industry information-sharing partnerships.