Blueprint: Build the Best in Cyber Defense cover image

Strategy 6: Illuminate Adversaries with Cyber Threat Intelligence

Blueprint: Build the Best in Cyber Defense

00:00

How to Choose the Right Threat Intelligence Vendor for Your Company

If you've gone as a SOC, if you have attributed previous incidents to an adversary that is known to do destructive type malware. That's going to really narrow what kind of CTI you want to ingest and then fuse moving forward. Relevancy and accuracy are two others that we also look at in that space. So thinking about when do they provide that update and that information, how fast does it come out?

Transcript
Play full episode

The AI-powered Podcast Player

Save insights by tapping your headphones, chat with episodes, discover the best highlights - and more!
App store bannerPlay store banner
Get the app