Download Publication

Building a Foundation for Successful Cyber Threat Intelligence Exchange - Chinese Translation
Release Date: 08/03/2018
This localized version of this publication was produced from the original source material through the efforts of chapters and volunteers but the translated content falls outside of the CSA Research Lifecycle. For any questions and feedback, contact research@cloudsecurityalliance.org.
描述: 当前网络攻击的频率和复杂程度在不断提高。攻击者可能是个人,也可能是资源丰富、 组织严密的团伙。面对这样的威胁,企业如果只关注内部防护措施,可能建成最后被绕过 “马其顿防线”;如果只依赖自身的情报能力,可能面临攻防不对等的窘境。为了解决上述问 题,网络威胁情报(CTI, Cyber Threat Intelligence)
Download this Resource
Prefer to access this resource without an account? Download it now.
Are you a research volunteer? Request to have your profile displayed on the website here.
Related Certificates & Training

Learn the core concepts, best practices and recommendation for securing an organization on the cloud regardless of the provider or platform. Covering all 14 domains from the CSA Security Guidance v4, recommendations from ENISA, and the Cloud Controls Matrix, you will come away understanding how to leverage information from CSA's vendor-neutral research to keep data secure on the cloud.
Learn more
Learn more