Talk:Cyber threat intelligence

Latest comment: 6 months ago by Bibamad in topic Page has a duplicate

Untitled edit

This is a vast, and emerging area. Please feel free to make changes, but do not use this page to promote commercially available solutions. Thanks

Greetings. I'm entirely new to this process as it's part of a class I'm taking that is in conjunction with Wiki Education. While all of the information in the article appears to currently be correct, I feel it could potentially be fleshed out more, such as in outlining the development of CTI in the U.S. DoD and its adoption by private industry, or some of the models and frameworks that are in use that facilitate the processes (i.e., Kill Chain, Diamond Model, and ATT&CK). Jmhogg (talk) 13:29, 30 May 2021 (UTC)Reply


Hi, I'm new as well to Wiki editing and I'm currently participating in a Wiki education course as part of my doctorate in cyber security. I was planning on adding a section on CTI Sharing. Cyber Threat Information Sharing is the topic that the 2015 U.S. federal legislation "Cybersecurity Information Sharing Act" was based on. This is a notable subject domain as it underpins a critical industry within cyber security. CTI sharing pertains the methodology and necessity for sharing critical indicators of compromise between organizations with the goal of increasing defensive efficacy. T0b0rx0r (talk) 22:39, 9 June 2021 (UTC)Reply

Wiki Education Foundation-supported course assignment edit

  This article was the subject of a Wiki Education Foundation-supported course assignment, between 17 May 2021 and 31 July 2021. Further details are available on the course page. Student editor(s): T0b0rx0r. Peer reviewers: Tkmu.

Above undated message substituted from Template:Dashboard.wikiedu.org assignment by PrimeBOT (talk) 14:02, 18 January 2022 (UTC)Reply

Wiki Education assignment: National and International Cybersecurity Policy edit

  This article was the subject of a Wiki Education Foundation-supported course assignment, between 17 January 2023 and 15 May 2023. Further details are available on the course page. Student editor(s): V0n57873 (article contribs).

Page has a duplicate edit

Hello, the following page fulfills exactly the same purpose and has the same perimeter : Threat intelligence. What should be done in such a case?Bibamad (talk) 08:13, 23 October 2023 (UTC)Reply