CHAPTER 2

Threat Intelligence in Support of Organizational Security

This chapter includes questions on the following topics:

•  Types of threat intelligence

•  Attack frameworks and their use in leveraging threat intelligence

•  Threat modeling methodologies

•  How threat intelligence is best used in other security functions

Threat is a mirror of security gaps. Cyber-threat is mainly a reflection of our weaknesses.

–Stèphane Nappo

Based on recent studies, an increasing number of organizations believe that participation in threat intelligence sharing improves cybersecurity posture. One of the benefits from this participation is believed to be an increased ability to detect, contain, and respond to security incidents. Automation has been ...

Get CompTIA CySA+ Cybersecurity Analyst Certification Practice Exams (Exam CS0-002), 2nd Edition now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.