Accessing threat intelligence

There are a few options that needs to be considered when software threat intelligence gathered:

  1. Is it timely? Information about software vulnerability from five years ago will probably be no relevant.
  2. Is it accurate? Can the information be trusted?
  3. Is it relevant? You may get accurate information, but do you utilize such software in your environment?

All these result in confidence level that you will have.

Comments

Popular posts from this blog

Absolute and relative path in HTML pages

Errors

goto PHP operator