Cyber Threat Alliance - Threat Intelligence Sharing: Difference between revisions
From GCA ACT
Jump to navigationJump to search
(Updated description via script) Tag: Reverted |
(Updated via script) Tag: Manual revert |
||
Line 1: | Line 1: | ||
=Description=<br> | =Description= | ||
The tool Threat Intelligence Sharing found at https://cyberthreatalliance.org/ is a Cyber Threat Alliance. This organization was established in 2014 in order to help improve cyber security by sharing information among its members, which include some of the largest tech companies in the world. The CTA's goal is to make it easier for these companies to defend themselves and their customers against cyber attacks. One of the ways they do this is by sharing threat intelligence.=More Information= | <br> | ||
The tool Threat Intelligence Sharing found at https://cyberthreatalliance.org/ is a Cyber Threat Alliance. This organization was established in 2014 in order to help improve cyber security by sharing information among its members, which include some of the largest tech companies in the world. The CTA's goal is to make it easier for these companies to defend themselves and their customers against cyber attacks. One of the ways they do this is by sharing threat intelligence. This includes information about known threats, | |||
<br> | |||
=More Information= | |||
<br> | <br> | ||
https://cyberthreatalliance.org/ | https://cyberthreatalliance.org/ | ||
[[Category:Small & Medium Sized Businesses]] | [[Category:Small & Medium Sized Businesses]] |
Revision as of 05:03, 23 April 2024
Description
The tool Threat Intelligence Sharing found at https://cyberthreatalliance.org/ is a Cyber Threat Alliance. This organization was established in 2014 in order to help improve cyber security by sharing information among its members, which include some of the largest tech companies in the world. The CTA's goal is to make it easier for these companies to defend themselves and their customers against cyber attacks. One of the ways they do this is by sharing threat intelligence. This includes information about known threats,