Manually Searching Advisories and Blogs for Threat Data - "Who's Got Time for That?"

Provided by: SecurityTube.net
Topic: Data Management
Format: Webcast
Threat intelligence is generating a lot of buzz, and many vendors/industry driven initiatives are focused on addressing how enterprises can leverage threat intelligence. Despite the appearance that cyber threat intelligence is structured and well formatted, most enterprise receive threat intelligence from external sources in unstructured text format, in forms of advisories, email bulletins, chat forums etc.

Find By Topic