The guardians of your company’s cyber security should be encouraged to network within the industry to swap information on the latest hacker tricks and most effective defences.
Nina Easton, American journalist and author
In this chapter, we will take a look at one of the methods of reducing our cyber security risks – sharing information about threats and vulnerabilities.
It’s worth bearing in mind that knowledge of vulnerabilities may lead an attacker to be able to mount a successful attack, but it’s only by careful sharing of information that security can be improved. This dichotomy can lead to tensions in the cyber security world, and the occasional holding back of information regarding some vulnerabilities.
The organisations ...