Cyber Threat Alliance - Threat Intelligence Sharing: Difference between revisions
From GCA ACT
Jump to navigationJump to search
(Created via script) |
(Updated via script) |
||
(2 intermediate revisions by the same user not shown) | |||
Line 1: | Line 1: | ||
=Description= | =Description= | ||
<br> | <br> | ||
The tool Threat Intelligence Sharing found at https://cyberthreatalliance.org/ is a Cyber Threat Alliance. This organization was established in 2014 in order to help improve cyber security by sharing information among its members, which include some of the largest tech companies in the world. The CTA's goal is to make it easier for these companies to defend themselves and their customers against cyber attacks. One of the ways they do this is by sharing threat intelligence. | The tool Threat Intelligence Sharing found at https://cyberthreatalliance.org/ is a Cyber Threat Alliance. This organization was established in 2014 in order to help improve cyber security by sharing information among its members, which include some of the largest tech companies in the world. The CTA's goal is to make it easier for these companies to defend themselves and their customers against cyber attacks. One of the ways they do this is by sharing threat intelligence. | ||
<br> | <br> | ||
=More Information= | =More Information= |
Latest revision as of 03:01, 24 April 2024
Description
The tool Threat Intelligence Sharing found at https://cyberthreatalliance.org/ is a Cyber Threat Alliance. This organization was established in 2014 in order to help improve cyber security by sharing information among its members, which include some of the largest tech companies in the world. The CTA's goal is to make it easier for these companies to defend themselves and their customers against cyber attacks. One of the ways they do this is by sharing threat intelligence.