John, ten years ago, enterprises' best "threat intel" was limited to what they could read on a few websites or what was unveiled on Microsoft’s Patch Tuesday. Today, however, enterprises are overwhelmed with options for receiving new information about cyber threats, ranging from commercial feeds to industry ISACs to specialized tools and services that collect, analyze, and prioritize threat data. How should enterprises aggregate, collate, and interpret threat data? In this webinar, learn how enterprises are using threat intelligence and best practices for integrating threat intel into security operations and incident response. |