CIO Dive

Research Library

The top resource for free research, white papers, reports, case studies, magazines, and eBooks.

Share Your Content with Us
on for readers like you. LEARN MORE
Who's Using Cyber Threat Intelligence

Request Your Free Analyst Paper Now:

"Who's Using Cyber Threat Intelligence"

In the last several years, we've seen a disturbing trend--attackers are innovating much faster than defenders are.

We've seen the “commercialization” of malware, with attack kits available on underground forums for anyone who wants to perpetrate a variety of attacks. Large botnets are available for rent, allowing attackers to send spam or launch DDoS attacks at will. Many attackers reuse malware and command and control protocols and methods, adapting their “products” over time to keep ahead of the antimalware industry and security professionals. As more and more attacks occur, however, the likelihood increases that some organization or group has seen the attack before.

Offered Free by: ThreatStream
See All Resources from: ThreatStream

Recommended for Professionals Like You: