hospitality) provide trusted environments where verified members can share threat data safely. These communities use standardised formats like STIX / TAXII to automate and anonymise data exchange. This allows organisations to contribute and consume intelligence without exposing sensitive internal details.
These communities comprise both large and small organisations. Typically, larger organisations have more mature security operations and can share vast amounts of threat intelligence, which is an invaluable resource for smaller organisations. Smaller organisations, usually distributed at different points within the supply chain, are also able to verify the threat intelligence from the front lines – and alert to novel attacks. This enables organisations to gain visibility over multiple supply chains and apply proactive and predictive reasoning to their own environments.
38 WWW. INTELLIGENTCISO. COM