Cyber Operations Rapid Assessment (CORA): A Guide to Best Practices for Threat-Informed Cyber Security Operations
MITRE CORP MCLEAN VA MCLEAN
Pagination or Media Count:
Actionable threat intelligence plays a critical role in cyber defense, from helping to protect systems and data, to protecting organizations, industries, and even countries. A number of recent highly-publicized breaches has led to considerable activity in both the public and private sector to enhance capabilities to collect, utilize, and share cyber threat information.1 2 Many organizations, however, struggle with introducing threat intelligence into their defenses, relying predominantly on static defensive measures and compliance-oriented processes. Transitioning to a threat-oriented posture is not easy, and change needs to occur across the triad of people, processes and technologies.