Threat Intelligence -- Collecting - Analysing - Evaluating

From GCA ACT
Jump to navigationJump to search

Description

This report by MWR InfoSecurity clearly describes several different types of threat intelligence, including strategic, tactical and operational variations. It also discusses the processes of requirements elicitation, collection, analysis, production and evaluation of threat intelligence. Also included are some quick wins and a maturity model for each of the types of threat intelligence defined by MWR InfoSecurity.

More Information

URL: https://github.com/hslatman/awesome-threat-intelligence/blob/main/docs/mwr-threat-intelligence-whitepaper.pdf