Update README.md
Этот коммит содержится в:
родитель
e1f80285a6
Коммит
a7bec6cdd3
@ -23,6 +23,8 @@ A collection of essential resources related to cyber threat intelligence theory.
|
||||
| [International Journal of Intelligence and CounterIntelligence](https://www.tandfonline.com/journals/ujic20) | An argument that CTI is a product without a process, which has several underlying causes and consequences for the CTI practice. It is also argues that the field needs to implement traditional intelligence analysis and methodology, rather than add more technology | [Cyber Threat Intelligence: A Product Without a Process?](https://www.tandfonline.com/doi/full/10.1080/08850607.2020.1780062) |
|
||||
| [mxm0z](https://github.com/mxm0z/)|This is a collection of useful resources concerning intelligence writing such as manuals/guides, standards, books, and articles|[Awesome Intelligence Writing](https://github.com/mxm0z/awesome-intelligence-writing) |
|
||||
| [threat-intelligence.eu](https://threat-intelligence.eu) | Technical standards related to threat intelligence | [Standards related to Threat Intelligence](https://threat-intelligence.eu/standards/) |
|
||||
| Joe Slowik | Threat Intelligence and the Limitations of Malware Analysis | [dragos.com](https://www.dragos.com/wp-content/uploads/Threat-Intelligence-and-the-Limits-of-Malware-Analysis.pdf) |
|
||||
| Joe Slowik | Analyzing Network Infrastructure as Composite Objects: While network infrastructure indicators and observables are typically viewed as atomic objects, seeing these items as composites enables powerful analysis able to keep pace with adversary evolution | [domaintools.com](https://www.domaintools.com/resources/blog/analyzing-network-infrastructure-as-composite-objects/) |
|
||||
|
||||
### `CTI Frameworks`
|
||||
|
||||
@ -65,3 +67,4 @@ A collection of essential resources related to cyber threat intelligence theory.
|
||||
| [CERTBI](https://cert.bancaditalia.it/)| This whitepaper details an enterprise-friendly service architecture for offering an enhanced CTI capability | [A service architecture for an enhanced CTI capability](http://ceur-ws.org/Vol-2940/paper37.pdf) |
|
||||
| CREST | CREST's Maturity Assessment Tools provide a mechanism for carrying out an assessment of the level of cyber threat intelligence maturity an organisation has at a high level. | [crest-approved.org](https://www.crest-approved.org/cyber-threat-intelligence-maturity-assessment-tools/) |
|
||||
| Mandiant | Mandiant has developed a comprehensive Cyber Threat Intelligence (CTI) Analyst Core Competencies Framework as a guide for the CTI discipline to identify, build, foster, and retain talent | [mandiant.com](https://www.mandiant.com/sites/default/files/2022-05/cti-analyst-core-competencies-framework-v1.pdf) |
|
||||
| ENISA | ENISA report on evaluating Threat Intelligence Platform (TIPs) | [enisa.europa.eu](https://www.enisa.europa.eu/publications/exploring-the-opportunities-and-limitations-of-current-threat-intelligence-platforms/at_download/fullReport) |
|
||||
|
||||
Загрузка…
x
Ссылка в новой задаче
Block a user