Preface
The volume of cyber threat events that occur has reached a point at which the world is talking about numerous attacks against various organizations' attack surfaces daily. Additionally, the reasoning behind these attacks ranges from opportunistic to financially motivated to revenge, and even to support ongoing physical conflicts between nations. It's no longer a question of if you or your organization will be impacted by a cyber threat event; it's now a question of when.
This book is written for one purpose, and that is to introduce individuals and organizations to cyber threat intelligence operations. In this book, we take you through the process of evaluating the cyber threat intelligence life cycle and discuss the various motivations, ...
Become an O’Reilly member and get unlimited access to this title plus top books and audiobooks from O’Reilly and nearly 200 top publishers, thousands of courses curated by job role, 150+ live events each month,
and much more.
Read now
Unlock full access