Cyber threat intelligence sharing: Survey and research directions

TD Wagner, K Mahbub, E Palomar, AE Abdallah - Computers & Security, 2019 - Elsevier
Abstract Cyber Threat Intelligence (CTI) sharing has become a novel weapon in the arsenal
of cyber defenders to proactively mitigate increasing cyber attacks. Automating the process …

Cybersecurity capabilities for critical infrastructure resilience

M Malatji, AL Marnewick, S Von Solms - Information & Computer …, 2022 - emerald.com
Purpose For many innovative organisations, Industry 4.0 paves the way for significant
operational efficiencies, quality of goods and services and cost reductions. One of the ways …

A success model for cyber threat intelligence management platforms

A Zibak, C Sauerwein, A Simpson - Computers & Security, 2021 - Elsevier
The increasingly persistent and sophisticated threat actors, along with the sheer speed at
which cyber attacks unfold, have made timely decision making imperative for ensuring the …

A shared cyber threat intelligence solution for smes

M Van Haastrecht, G Golpur, G Tzismadia, R Kab… - Electronics, 2021 - mdpi.com
Small-and medium-sized enterprises (SMEs) frequently experience cyberattacks, but often
do not have the means to counter these attacks. Therefore, cybersecurity researchers and …

Enhancing cyber-threat intelligence in the arab world: Leveraging ioc and misp integration

IY Alzahrani, S Lee, K Kim - Electronics, 2024 - mdpi.com
Cybercrime threat intelligence enables proactive measures against threat actors and
informed, data-driven security decisions. This study proposes a practical implementation of …

[PDF][PDF] Towards an Evaluation Framework for Threat Intelligence Sharing Platforms.

S Bauer, D Fischer, C Sauerwein, S Latzel, D Stelzer… - HICSS, 2020 - core.ac.uk
Threat intelligence sharing is an important countermeasure against the increasing number
of security threats to which companies and governments are exposed. Its objective is the …

From threat data to actionable intelligence: an exploratory analysis of the intelligence cycle implementation in cyber threat intelligence sharing platforms

C Sauerwein, D Fischer, M Rubsamen… - Proceedings of the 16th …, 2021 - dl.acm.org
In the last couple of years, organizations have demonstrated an increasing willingness to
share data, information and intelligence regarding emerging threats to collectively protect …

Cybersecurity policy and the legislative context of the water and wastewater sector in South Africa

M Malatji, AL Marnewick, S von Solms - Sustainability, 2020 - mdpi.com
The water and wastewater sector is an important lifeline upon which other economic sectors
depend. Securing the sector's critical infrastructure is therefore important for any country's …

[PDF][PDF] Cybersecurity in UK Universities: mapping (or managing) threat intelligence sharing within the higher education sector

A Piazza, S Vasudevan, M Carr - Journal of Cybersecurity, 2023 - academic.oup.com
Higher education has recently been identified as a sector of concern by the UK National
Cyber Security Centre (NCSC). In 2021, the NCSC reported that universities and higher …

Barriers and incentives to cybersecurity threat information sharing in developing countries: a case study of Saudi Arabia

W Alkalabi, L Simpson, H Morarji - Proceedings of the 2021 Australasian …, 2021 - dl.acm.org
Threat information sharing practices have the potential to improve cyber security. However,
participation in sharing communities is not widely adopted. The existing literature finds a …