z-logo
open-access-imgOpen Access
Threat Intelligence technology and methods of its use to protect the company from cyber threats
Author(s) -
O. O. Dorokhin,
AUTHOR_ID,
Volodymyr Marchenko,
I. D. Semenova
Publication year - 2021
Publication title -
sučasnij zahist ìnformacìï
Language(s) - English
Resource type - Journals
ISSN - 2409-7292
DOI - 10.31673/2409-7292.2021.031216
Subject(s) - cyber threats , computer security , intelligence analysis , intelligence cycle , process (computing) , value (mathematics) , military intelligence , computer science , business intelligence , business , knowledge management , internet privacy , political science , machine learning , law , operating system
The article is devoted to the methods of using Threat Intelligence technology ("threat intelligence" or "cyber intelligence" in English) in companies that need to build a secure IT infrastructure and mechanisms to counter information security threats using this technology. The value of Threat Intelligence against the background of existing cyber threats has been studied. Ways to implement Threat Intelligence technology are described. The process of working with Threat Intelligence is described step by step, recommendations are given to get the most out of cyber intelligence.

The content you want is available to Zendy users.

Already have an account? Click here to sign in.
Having issues? You can contact us here