Sharing Cyber Threat Intelligence (CTI) is a key strategy for improving cyber defense, but there are risks of breaching regulations and laws regarding privacy. With regulations such as the General Data Protection Regulation (GDPR) that are designed to protect citizens’ data privacy, the managers of CTI datasets need clear guidance on how and when it is legal to share such information. This paper defines the impact that GDPR legal aspects may have on the sharing of CTI. In addition, we define adequate protection levels for sharing CTI to ensure compliance with the GDPR. We also present a model for evaluating the legal requirements for supporting decision making when sharing CTI, which also includes advice on the required protection level. Fi...
Network threats often come from multiple sources and affect a variety of domains. Collaborative shar...
In order to ensure confidentiality, integrity and availability (so called CIA triad) of data within ...
Threat intelligence is the provision of evidence-based knowledge about existing or potential threats...
Sharing Cyber Threat Intelligence (CTI) is a key strategy for improving cyber defense, but there are...
In recent years, the number of cyber-attacks that affect critical infrastructures such as health, t...
The menace of cyber attacks has become a concern for both the public and private sectors. Several ap...
The file attached to this record is the author's final peer reviewed version. The Publisher's final ...
While considerable debate exists with regard to the best strategies for protecting America’s various...
Cyber Threat Intelligence (CTI) sharing has become a novel weapon in the arsenal of cyber defenders ...
In this article, we discuss the issues of GDPR's impact on cyber-security software and operations, n...
This Article takes an in-depth look at the evolution of cybersecurity information sharing legislatio...
Data protection is perhaps the most important area in which legal requirements determine whether and...
Cyber Threat Intelligence (CTI) sharing has become a significant issue with the increasing number of...
Cyber Threat Intelligence (CTI) is the knowledge of cyber and physical threats that help mitigate po...
Today threat landscape evolving at the rapid rate with many organization continuously face complex a...
Network threats often come from multiple sources and affect a variety of domains. Collaborative shar...
In order to ensure confidentiality, integrity and availability (so called CIA triad) of data within ...
Threat intelligence is the provision of evidence-based knowledge about existing or potential threats...
Sharing Cyber Threat Intelligence (CTI) is a key strategy for improving cyber defense, but there are...
In recent years, the number of cyber-attacks that affect critical infrastructures such as health, t...
The menace of cyber attacks has become a concern for both the public and private sectors. Several ap...
The file attached to this record is the author's final peer reviewed version. The Publisher's final ...
While considerable debate exists with regard to the best strategies for protecting America’s various...
Cyber Threat Intelligence (CTI) sharing has become a novel weapon in the arsenal of cyber defenders ...
In this article, we discuss the issues of GDPR's impact on cyber-security software and operations, n...
This Article takes an in-depth look at the evolution of cybersecurity information sharing legislatio...
Data protection is perhaps the most important area in which legal requirements determine whether and...
Cyber Threat Intelligence (CTI) sharing has become a significant issue with the increasing number of...
Cyber Threat Intelligence (CTI) is the knowledge of cyber and physical threats that help mitigate po...
Today threat landscape evolving at the rapid rate with many organization continuously face complex a...
Network threats often come from multiple sources and affect a variety of domains. Collaborative shar...
In order to ensure confidentiality, integrity and availability (so called CIA triad) of data within ...
Threat intelligence is the provision of evidence-based knowledge about existing or potential threats...