Using Network Based Security Systems to Search for STIX and TAXII Based Indicators of Compromise

As the interest in collecting actionable cyber intelligence has grown substantially over the last several years in response to the growing sophistication of attackers, with it has come the need for organizations to more readily process indicators of compromise - and act immediately upon them to...
By
Jason Mack
August 10, 2015

All papers are copyrighted. No re-posting of papers is permitted

470x382_Generic_Whitepaper.jpg