Pages

Categories

Search

 

Automated Attack, Threat Intelligence Sharing Sought

by
November 14, 2013
OODA Loop
No Comment

“If you’re looking for tangible information sharing success stories around attack intelligence, some might point to the prompt publishing of indicators of compromise (IOC) as an example. Security and forensics companies will publish MD5 hashes of malware, IP addresses involved in attacks, malware signatures and more artifacts relevant to a breach or malware outbreak. Problem […]

Via OODA Loop