Read the full (open access) study here: dl.acm.org/doi/10.1145/...
Read the full (open access) study here: dl.acm.org/doi/10.1145/...
3. Enterprises could combine efforts (e.g., via an ISAC or CSIRT) for a more comprehensive, industry-wide evaluation of CTI timeliness.
3. Enterprises could combine efforts (e.g., via an ISAC or CSIRT) for a more comprehensive, industry-wide evaluation of CTI timeliness.
So, what does this mean for enterprise customers buying these feeds?
1. Customers should re-evaluate their spending if their primary goal is real-time intrusion detection.
So, what does this mean for enterprise customers buying these feeds?
1. Customers should re-evaluate their spending if their primary goal is real-time intrusion detection.
We analyzed the IOC feeds of two major commercial providers against a large dataset of network traffic metadata. Most IOCs pointed to resources that had already been abandoned by the time they were published.
We analyzed the IOC feeds of two major commercial providers against a large dataset of network traffic metadata. Most IOCs pointed to resources that had already been abandoned by the time they were published.