mirror of
https://github.com/hslatman/awesome-threat-intelligence.git
synced 2024-10-01 05:45:38 -04:00
Alphabeticalize research
This commit is contained in:
parent
fd9c5a633b
commit
eeac4572a2
16
README.md
16
README.md
@ -379,14 +379,6 @@ A certain amount of (domain- or business-specific) analysis is necessary to crea
|
||||
## <a name="research"></a>Research, Standards & Books
|
||||
|
||||
<table>
|
||||
<tr>
|
||||
<td>
|
||||
<a href="http://download.microsoft.com/download/8/0/1/801358EC-2A0A-4675-A2E7-96C2E7B93E73/Framework_for_Cybersecurity_Info_Sharing.pdf" target="_blank">Microsoft Research Paper</a>
|
||||
</td>
|
||||
<td>
|
||||
A framework for cybersecurity information sharing and risk reduction. A high level overview paper by Microsoft.
|
||||
</td>
|
||||
</tr>
|
||||
<tr>
|
||||
<td>
|
||||
<a href="https://github.com/kbandla/APTnotes" target="_blank">APTnotes</a>
|
||||
@ -411,6 +403,14 @@ A certain amount of (domain- or business-specific) analysis is necessary to crea
|
||||
The Guide to Cyber Threat Information Sharing (NIST Special Publication 800-15, draft) assists organizations in establishing computer security incident response capabilities that leverage the collective knowledge, experience, and abilities of their partners by actively sharing threat intelligence and ongoing coordination. The guide provides guidelines for coordinated incident handling, including producing and consuming data, participating in information sharingcommunities, and protecting incident-related data.
|
||||
</td>
|
||||
</tr>
|
||||
<tr>
|
||||
<td>
|
||||
<a href="http://download.microsoft.com/download/8/0/1/801358EC-2A0A-4675-A2E7-96C2E7B93E73/Framework_for_Cybersecurity_Info_Sharing.pdf" target="_blank">Microsoft Research Paper</a>
|
||||
</td>
|
||||
<td>
|
||||
A framework for cybersecurity information sharing and risk reduction. A high level overview paper by Microsoft.
|
||||
</td>
|
||||
</tr>
|
||||
<tr>
|
||||
<td>
|
||||
<a href="https://www.cpni.gov.uk/Documents/Publications/2015/23-March-2015-MWR_Threat_Intelligence_whitepaper-2015.pdf" target="_blank">Threat Intelligence: Collecting, Analysing, Evaluating</a>
|
||||
|
Loading…
Reference in New Issue
Block a user