How to actually implement Threat Intelligence automation

How to actually implement Threat Intelligence

As a starting point, a good basic understanding of possible Treat Intelligence integrations is a must. This will allow us to imagine fitting basic setup and future evolutions as TI operations mature inside the organization. We can form our first TI integration strategy on simple…

Indicators of Compromise in Threat Intelligence – Let’s speak some InfoSec Jargon

Indicators of Compromise (IOC) are items of forensic data (like information found in event logs or network flows), that highly indicate conceivably nasty activity in an organization’s system…