Manually Searching Advisories and Blogs for Threat Data - "Who's Got Time for That?"

Threat intelligence is generating a lot of buzz, and many vendors/industry driven initiatives are focused on addressing how enterprises can leverage threat intelligence. Despite the appearance that cyber threat intelligence is structured and well formatted, most enterprise receive threat intelligence from external sources in unstructured text format, in forms of advisories, email bulletins, chat forums etc.

Provided by: SecurityTube.net Topic: Data Management Date Added: Feb 2015 Format: Webcast

Find By Topic