Automated Attack, Threat Intelligence Sharing Sought

“If you’re looking for tangible information sharing success stories around attack intelligence, some might point to the prompt publishing of indicators of compromise (IOC) as an example. Security and forensics companies will publish MD5 hashes of malware, IP addresses involved in attacks, malware signatures and more artifacts relevant to a breach or malware outbreak. Problem is, all of the artifacts are made available post-attack, and don’t satisfy the need for real-time data on intrusions, in particular for sensitive industries such as financial services or utilities.”

Source:Automated Attack, Threat Intelligence Sharing Sought | Threatpost | The First Stop For Security News

OODA Analyst

OODA Analyst

OODA is comprised of a unique team of international experts capable of providing advanced intelligence and analysis, strategy and planning support, risk and threat management, training, decision support, crisis response, and security services to global corporations and governments.