Threat Intelligence -- Collecting - Analysing - Evaluating

From GCA ACT
Revision as of 02:59, 4 July 2024 by Globalcyberalliance (talk | contribs) (Created via script)
(diff) ← Older revision | Latest revision (diff) | Newer revision → (diff)
Jump to navigationJump to search

Description

This report by MWR InfoSecurity clearly describes several different types of threat intelligence, including strategic, tactical and operational variations. It also discusses the processes of requirements elicitation, collection, analysis, production and evaluation of threat intelligence. Also included are some quick wins and a maturity model for each of the types of threat intelligence defined by MWR InfoSecurity.

More Information

URL: https://github.com/hslatman/awesome-threat-intelligence/blob/main/docs/mwr-threat-intelligence-whitepaper.pdf