Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Comments
How To Use Threat Intelligence Intelligently
Newest First  |  Oldest First  |  Threaded View
Mike Anders
Mike Anders,
User Rank: Apprentice
8/30/2016 | 3:58:14 PM
Consumption
I would have to disagree, somewhat. If you cannot "consume" the data then why are you subscribed to a half dozen threat intelligence feeds? That I can agree with.

Remember when your Mother told you to chew your food carefully and not just gulp it down? Works with data as well. It is not how much you "consume" but rather how you go about chewing through the data to produce information. that when analyzed results in actionable intelligence products.

You need a metehodology when it comes to assessing your data. NGA, DoD, DIA, CIA and just about all the other three-letter agencies in the IC, working the cyber problem, are already relying on Acitivity-Based Intelligence (ABI) methods and tradecraft, enabled by Object Based Production (OBP) techniques.

No, they are not just "buzzwords"and yes they are getting good results. If you have not heard of ABI or OBP, then you probably really are just gulping down your food! I mean your data, and choking on it! Not a criticism, just an observation! :->)


Edge-DRsplash-10-edge-articles
I Smell a RAT! New Cybersecurity Threats for the Crypto Industry
David Trepp, Partner, IT Assurance with accounting and advisory firm BPM LLP,  7/9/2021
News
Attacks on Kaseya Servers Led to Ransomware in Less Than 2 Hours
Robert Lemos, Contributing Writer,  7/7/2021
Commentary
It's in the Game (but It Shouldn't Be)
Tal Memran, Cybersecurity Expert, CYE,  7/9/2021
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
Creating an Effective Incident Response Plan
Security teams are realizing their organizations will experience a cyber incident at some point. An effective incident response plan that takes into account their specific requirements and has been tested is critical. This issue of Tech Insights also includes: -a look at the newly signed cyber-incident law, -how organizations can apply behavioral psychology to incident response, -and an overview of the Open Cybersecurity Schema Framework.
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2022-44296
PUBLISHED: 2022-11-30
Sanitization Management System v1.0 is vulnerable to SQL Injection via /php-sms/admin/quotes/manage_remark.php?id=.
CVE-2022-44294
PUBLISHED: 2022-11-30
Sanitization Management System v1.0 is vulnerable to SQL Injection via /php-sms/admin/?page=services/manage_service&id=.
CVE-2022-44295
PUBLISHED: 2022-11-30
Sanitization Management System v1.0 is vulnerable to SQL Injection via /php-sms/admin/orders/assign_team.php?id=.
CVE-2022-4234
PUBLISHED: 2022-11-30
A vulnerability was found in SourceCodester Canteen Management System. It has been rated as problematic. This issue affects the function builtin_echo of the file youthappam/brand.php. The manipulation of the argument brand_name leads to cross site scripting. The attack may be initiated remotely. The...
CVE-2022-44151
PUBLISHED: 2022-11-30
Simple Inventory Management System v1.0 is vulnerable to SQL Injection via /ims/login.php.