Talk:Cyber threat intelligence

Untitled
This is a vast, and emerging area. Please feel free to make changes, but do not use this page to promote commercially available solutions. Thanks

Greetings. I'm entirely new to this process as it's part of a class I'm taking that is in conjunction with Wiki Education. While all of the information in the article appears to currently be correct, I feel it could potentially be fleshed out more, such as in outlining the development of CTI in the U.S. DoD and its adoption by private industry, or some of the models and frameworks that are in use that facilitate the processes (i.e., Kill Chain, Diamond Model, and ATT&CK). Jmhogg (talk) 13:29, 30 May 2021 (UTC)

Hi, I'm new as well to Wiki editing and I'm currently participating in a Wiki education course as part of my doctorate in cyber security. I was planning on adding a section on CTI Sharing. Cyber Threat Information Sharing is the topic that the 2015 U.S. federal legislation "Cybersecurity Information Sharing Act" was based on. This is a notable subject domain as it underpins a critical industry within cyber security. CTI sharing pertains the methodology and necessity for sharing critical indicators of compromise between organizations with the goal of increasing defensive efficacy. T0b0rx0r (talk) 22:39, 9 June 2021 (UTC)

Wiki Education Foundation-supported course assignment
This article was the subject of a Wiki Education Foundation-supported course assignment, between 17 May 2021 and 31 July 2021. Further details are available on the course page. Student editor(s): T0b0rx0r. Peer reviewers: Tkmu.

Above undated message substituted from Template:Dashboard.wikiedu.org assignment by PrimeBOT (talk) 14:02, 18 January 2022 (UTC)

Page has a duplicate
Hello, the following page fulfills exactly the same purpose and has the same perimeter : Threat intelligence. What should be done in such a case?Bibamad (talk) 08:13, 23 October 2023 (UTC)