Главная
Study mode:
on
1
Introduction
2
When did the problem begin
3
Verification
4
Breaking Systems
5
Buffer Overflow
6
Security is a core requirement
7
Where does that leave us
8
Not getting more successful
9
The attacker has to be right
10
In 2014 we will show up barely half staffed
11
Security roles are vacant
12
What it takes to become a doctor
13
Top 10 computer science programs
14
Large attacks
15
Under pressure
16
Working together
17
Discovery
18
Challenges
19
Key Principles
20
Automated Community
21
Brute Force Login
22
Community Participation
23
Conclusion
24
Questions
25
Application Layer Monitoring
26
Outro
Description:
Explore a keynote address from AppSecEU 2014 in Cambridge focusing on combating advanced cyber threats through shared intelligence. Delve into the evolving landscape of cyber adversaries, their sophisticated techniques, and the underground market forces driving their activities. Learn about methods for identifying, anonymizing, and sharing threat intelligence, with practical applications in areas such as DDoS prevention and malware detection. Gain insights into how collaborative threat intelligence can accelerate response times and prevent security breaches. Examine the challenges facing the cybersecurity industry, including talent shortages and the increasing complexity of attacks. Discover key principles for effective threat intelligence sharing and the importance of automated, community-driven approaches. Conclude with a Q&A session covering topics like application layer monitoring and the future of cybersecurity collaboration.

Fighting Next-Generation Adversaries with Shared Threat Intelligence

OWASP Foundation
Add to list