Harnessing the Power of Cloud-Based Technology to Foster an Integrated and Dynamic Platform for Sharing Threat Intelligence, thereby Strengthening Collective …

S Prabha, R Tharani, RC Yogitaadevi… - 2024 3rd International …, 2024 - ieeexplore.ieee.org
In order to improve the sharing of threat intelligence and strengthen group defenses against
new cybersecurity concerns, this abstract investigates the possibility of cloud-based …

Cloud based Threat Intelligence Sharing for Collective Defence

MS Roobini, MB Chowdary, Y Srinivas… - 2024 Ninth …, 2024 - ieeexplore.ieee.org
To improve cybersecurity, cloud-based threat intelligence sharing for collective defense is
essential. Organizations must work together to effectively detect and respond to the variety of …

[PDF][PDF] The Impact of Cloud Computing on Cybersecurity Threat Hunting and Threat Intelligence Sharing: Data Security, Data Sharing, and Collaboration

N Mohammad - International Journal of Computer Applications …, 2022 - researchgate.net
Cloud computing has revolutionized the landscape of cybersecurity threat hunting and threat
intelligence sharing, fostering a paradigm shift in data security practices. This article …

[PDF][PDF] Threat Intelligence and Sharing for Collaborative Defense

N Panwar - kalaharijournals.com
Collaborative defense and the exchange of threat intelligence have emerged as important
weapons in the fight against cyber threats. Cooperation and the exchange of threat …

From threat data to actionable intelligence: an exploratory analysis of the intelligence cycle implementation in cyber threat intelligence sharing platforms

C Sauerwein, D Fischer, M Rubsamen… - Proceedings of the 16th …, 2021 - dl.acm.org
In the last couple of years, organizations have demonstrated an increasing willingness to
share data, information and intelligence regarding emerging threats to collectively protect …

Cyber threat intelligence sharing for co-operative defense in multi-domain entities

S Purohit, R Neupane, NR Bhamidipati… - … on Dependable and …, 2022 - ieeexplore.ieee.org
Cloud-hosted applications are prone to targeted attacks such as DDoS, advanced persistent
threats, Cryptojacking which threaten service availability. Recently, methods for threat …

Leveraging a cloud-native architecture to enable semantic interconnectedness of data for cyber threat intelligence

M Ammi, O Adedugbe, FM Alharby, E Benkhelifa - Cluster Computing, 2022 - Springer
Cloud technologies have several merits including the elimination of cost incurred when
traditional technologies are adopted. Despite the benefits, the cloud is still facing security …

[PDF][PDF] Cyber Threat Intelligence Sharing Platforms: A Comprehensive Analysis of Software Vendors and Research Perspectives

C Sauerwein, T Staiger - diglib.uibk.ac.at
The use of threat intelligence to improve the cybersecurity of organizations is on the rise.
Cyberattacks are steadily increasing and becoming more sophisticated. Threat intelligence …

Uncovering Critical Resources and Factors Influencing the Use of Threat Intelligence Sharing Platforms

C Sauerwein, C Wenzl, R Breu - 2024 - scholarspace.manoa.hawaii.edu
Threat intelligence sharing is an effective security control to develop situational awareness
of the rapidly growing number of new, increasingly sophisticated and targeted cyber threats …

AI-POWERED THREAT INTELLIGENCE FOR PROACTIVE SECURITY MONITORING IN CLOUD INFRASTRUCTURES

TC Kanth - 2024 - philpapers.org
Cloud computing has become an essential component of enterprises and organizations
globally in the current era of digital technology. The cloud has a multitude of advantages …