Challenges around Operationalizing Threat Intelligence
When it comes to threat intelligence, there seem to be two primary focus areas in play: The threat intelligence data itself and the legislative rhetoric around threat intelligence sharing (i.e. CISA, CISPA, etc.). What’s missing? The answer to a basic question: How do organizations get actual value out of threat intelligence data and threat intelligence sharing in a meaningful way?As it turns out, the answer to this question isn’t obvious and many enterprises continue to struggle as they seek to “operationalize” threat intelligence. In a recently published ESG research report titled, Threat Intelligence and Its Role Within Enterprise Cybersecurity Practices, ESG surveyed 304 cybersecurity professionals working at enterprise organizations (i.e. more than 1,000 employees), and asked them to rate themselves in terms of their ability to operationalize threat intelligence (note: I am an ESG employee). The data indicates that:To read this article in full or to leave a comment, please click here

MYTH: using Ansible to do fully-automated provisioning of Windows instances in AWS is difficult, because WinRM is not enabled by default on Amazon’s Windows AMIs, and the admin password is not known at startup.
The NEC subsidiary gives Telefónica a hand with SDN and NFV.
Skyport answers post-DemoFriday questions on its cloud-managed SkySecure system. Read the full Q&A on SDxCentral.
Oracle Leverages a layer of the ETSI NFV MANO framework to orchestrate both physical and virtual network functions.