Abstract

The article is devoted to the methods of using Threat Intelligence technology ("threat intelligence" or "cyber intelligence" in English) in companies that need to build a secure IT infrastructure and mechanisms to counter information security threats using this technology. The value of Threat Intelligence against the background of existing cyber threats has been studied. Ways to implement Threat Intelligence technology are described. The process of working with Threat Intelligence is described step by step, recommendations are given to get the most out of cyber intelligence.

Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call