Fighting next-generation adversaries with automated shared threat intelligence

Guest post by Chua Ying Tze, HP Enterprise Security APJ


Today, adversaries are technically advanced, structured around a cybercrime market, and using paradigm shifts in technology to compromise more victims. Attackers are becoming more effective and continue to cause widespread damage and security issues that are extremely difficult to identify through specialization and collaboration, even as systems become more secure.


However, recent advances in technology provide the foundation for a new type of industry-wide threat intelligence exchange. By having an easier way to communicate,  potential targets can now organize, collaborate and leverage threat intelligence more quickly and effectively—decreasing the occurance of attacks.


fighting next generation adversaries with automated shared threat intelligence.pngJoin us for a live webinar on 13 Mar 2014 to find out about:

  • Techniques for identifying, anonymizing and sharing threat intelligence
  • Use cases for increasing response times and preventing breaches
  • Case studies illustrating the importance of collaborative threat intelligence


Date: Thursday, 13 Mar 2014 (50 mins)

08:00 - 08:45 (AM) Mumbai

10:30 - 11:15 (AM) Singapore / Hong Kong

11:30 - 12:15 (AM) Tokyo / Seoul

13:30 - 14:15 (PM) Sydney


Register for the webinar here

Leave a Comment

We encourage you to share your comments on this post. Comments are moderated and will be reviewed
and posted as promptly as possible during regular business hours

To ensure your comment is published, be sure to follow the Community Guidelines.

Be sure to enter a unique name. You can't reuse a name that's already in use.
Be sure to enter a unique email address. You can't reuse an email address that's already in use.
Type the characters you see in the picture above.Type the words you hear.
Showing results for 
Search instead for 
Do you mean 
About the Author
This account is for guest bloggers. The blog post will identify the blogger.

Follow Us
The opinions expressed above are the personal opinions of the authors, not of HP. By using this site, you accept the Terms of Use and Rules of Participation.