Information sharing in cybersecurity: A review

A Pala, J Zhuang - Decision Analysis, 2019 - pubsonline.informs.org
In this survey, we review the cybersecurity information-sharing literature, categorizing the
identified papers based on their main focus and methodological approaches implemented to …

A shared cyber threat intelligence solution for smes

M Van Haastrecht, G Golpur, G Tzismadia, R Kab… - Electronics, 2021 - mdpi.com
Small-and medium-sized enterprises (SMEs) frequently experience cyberattacks, but often
do not have the means to counter these attacks. Therefore, cybersecurity researchers and …

Developing a cyber threat intelligence sharing platform for South African organisations

M Mutemwa, J Mtsweni… - 2017 Conference on …, 2017 - ieeexplore.ieee.org
Cyberattacks are on the increase in severity, complexity and frequency, negatively affecting
the citizens, government, and businesses. Adversely, the security and Defence role-players …

Exploring incentives and challenges for cybersecurity intelligence sharing (CIS) across organizations: A systematic review

F Kolini, LJ Janczewski - … of the Association for Information Systems, 2022 - aisel.aisnet.org
Cybersecurity intelligence sharing (CIS) has gained significance as an organizational
function to protect critical information assets, manage cybersecurity risks, and improve …

Integrating a security operations centre with an organization's existing procedures, policies and information technology systems

M Mutemwa, J Mtsweni, L Zimba - … International conference on …, 2018 - ieeexplore.ieee.org
A Cybersecurity Operation Centre (SOC) is a centralized hub for network event monitoring
and incident response. SOCs are critical when determining an organization's cybersecurity …

Exploring the value of a cyber threat intelligence function in an organization

A Berndt, J Ophoff - Information Security Education. Information Security in …, 2020 - Springer
Organizations can struggle to cope with the rapidly advancing threat landscape. A cyber
threat intelligence (CTI) function broadly aims to understand how threats operate to better …

Development of a cyber-threat intelligence-sharing model from big data sources

J Mtsweni, M Mutemwa, N Mkhonto - Journal of Information Warfare, 2016 - JSTOR
As data in cyberspace continues to grow because of the ubiquity of Information
Communication Technologies (ICT), it is becoming challenging to obtain context-aware …

A unified cybersecurity framework for complex environments

J Mtsweni, N Gcaza, M Thaba - Proceedings of the Annual Conference of …, 2018 - dl.acm.org
Information and Communication Technologies (ICTs) present a number of vulnerabilities,
threats and risks that could lead to devastating cyber-attacks resulting into huge financial …

TAS: Trust Assessment System

A Ronchi - International Journal of Information Security, 2018 - re.public.polimi.it
The present paper briefly introduces a general view on tomorrow's border control system
and EU inter-BCP real time information sharing, exploring and proposing new operational …

Technical Guidelines for Evaluating and Selecting Data Sources for Cybersecurity Threat Intelligence

J Mtsweni, M Mutemwa - Proceedings of the ECCWS 2019 18th …, 2019 - books.google.com
Extracting actionable threat intelligence from what is perceived to be relevant data sources
in the cybersecurity environments still faces a number of unsolved challenges. The …