CHAPTER 1
The Importance of Threat Data and Intelligence
In this chapter you will learn:
• The foundations of threat intelligence
• Common intelligence sources and the intelligence cycle
• Effective use of indicators of compromise
• Information sharing best practices
Every battle is won before it is ever fought.
—Sun Tzu
Modern networks are incredibly complex entities whose successful and ongoing defense requires a deep understanding of what is present on the network, what weaknesses exist, and who might be targeting them. Getting insight into network activity allows for greater agility in order to outmaneuver increasingly sophisticated threat actors, but not every organization can afford to invest in the next-generation detection ...
Get CompTIA CySA+ Cybersecurity Analyst Certification All-in-One Exam Guide, Second Edition (Exam CS0-002), 2nd Edition now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.