Cyber Threat Intelligence (CTI) – Part 2

In part one, I outlined what CTI is and where it can be acquired to demonstrate its value. Here I will dive deeper into how organizations can be efficient in using this tool to mature their security programs’ management of today’s threats.  After CTI sources for the company’s threat intelligence program have been selected, the CISO now needs to address use cases on how this information can be leveraged to provide value and reduce risk exposure.

Read full news article on CSOONLINE.com

 


Date:

Categorie(s):