Accessing threat intelligence
There are a few options that needs to be considered when software threat intelligence gathered:
- Is it timely? Information about software vulnerability from five years ago will probably be no relevant.
- Is it accurate? Can the information be trusted?
- Is it relevant? You may get accurate information, but do you utilize such software in your environment?
All these result in confidence level that you will have.
Comments
Post a Comment