This archive is retained to ensure existing URLs remain functional. It will not contain any emails sent to this mailing list after July 1, 2024. For all messages, including those sent before and after this date, please visit the new location of the archive at https://mailman.ripe.net/archives/list/[email protected]/
[cooperation-wg] Fixing threat intelligence for you
- Previous message (by thread): [cooperation-wg] Massive IP blockings in Russia
Messages sorted by: [ date ] [ thread ] [ subject ] [ author ]
Alex Smirnoff
ark at eltex.net
Fri May 18 15:27:37 CEST 2018
Hi everyone, I decided to re-animate my old project: to fix threat intelligence for vulnerability management. First of all, why is it broken? (a picture attached) because today's threat intel is massively based on attack events, which means you get it too late. My idea is to create and maintain a database of available exploit capabilities, which whould help you to know (hopefully slightly in advance) what you need to urgently patch right now. https://uisgcon.org/pdf/uisgcon13-alex-smirnoff+what-is-wrong-with-information-security.pdf sildes 23-46 contain a more precise description of how would it look like. Yet I cannot do it by myself: i need either people to help me, or money to hire people, hosting resources, or probably all of the above. Anyone could suggest me a good direction to look for? -------------- next part -------------- A non-text attachment was scrubbed... Name: threatintel.png Type: image/png Size: 487057 bytes Desc: not available URL: </ripe/mail/archives/cooperation-wg/attachments/20180518/84c6c1a4/attachment.png>
- Previous message (by thread): [cooperation-wg] Massive IP blockings in Russia
Messages sorted by: [ date ] [ thread ] [ subject ] [ author ]