While the need for empirical investigations of cybersecurity analysts' collaborative work practices is widely acknowledged, research efforts are fairly limited. This paper aims to provide empirical evidence to support a deeper consideration for the seemingly intangible collaborative practices that situational awareness in cybersecurity relies on and add to our understanding of what it means to do threat intelligence. In particular, it aims to unpack the informal forms of collaboration and coordination at work that build tacit knowledge about threat actors and defenders and that span across time, people and tools to inform the translation of threat information into actionable threat intelligence. In-depth semi-structured interviews and diary...
In this paper, insights are provided into how senior managers can establish a global cyber security ...
Cyber Threat Intelligence (CTI) can be used by organisations to assist their security teams in safeg...
Today cyber attacks, incidents, threats, and breaches continue to rise in scale and numbers, as soph...
This thesis was submitted for the award of Doctor of Philosophy and was awarded by Brunel University...
The use of tacit knowledge has previously been shown to help expedite problem-solving procedures in ...
Frequent data breaches and security incidents show that organizations face challenges in protecting ...
The number of cyber attacks over the last decade has been increasing sharply while being more and mo...
Organisations, governments and users are increasingly vulnerable to cyberattacks, which effects may ...
Active usage of threat intelligence information supports effective prevention, mitigation and defenc...
peer reviewedOur understanding of the defense mechanisms against cyber-attacks is, to a great extent...
We present the results of an interview study on the state of practice for Situational Awareness (SA)...
Previous research have found that organisations lack structured approaches for learning from inciden...
Cyber security analysts in different geographical and organizational domains are often largely taske...
Cyber-attacks are increasingly perpetrated by organised, sophisticated and persistent entities such ...
Cyber Threat Intelligence (CTI) sharing has become a novel weapon in the arsenal of cyber defenders ...
In this paper, insights are provided into how senior managers can establish a global cyber security ...
Cyber Threat Intelligence (CTI) can be used by organisations to assist their security teams in safeg...
Today cyber attacks, incidents, threats, and breaches continue to rise in scale and numbers, as soph...
This thesis was submitted for the award of Doctor of Philosophy and was awarded by Brunel University...
The use of tacit knowledge has previously been shown to help expedite problem-solving procedures in ...
Frequent data breaches and security incidents show that organizations face challenges in protecting ...
The number of cyber attacks over the last decade has been increasing sharply while being more and mo...
Organisations, governments and users are increasingly vulnerable to cyberattacks, which effects may ...
Active usage of threat intelligence information supports effective prevention, mitigation and defenc...
peer reviewedOur understanding of the defense mechanisms against cyber-attacks is, to a great extent...
We present the results of an interview study on the state of practice for Situational Awareness (SA)...
Previous research have found that organisations lack structured approaches for learning from inciden...
Cyber security analysts in different geographical and organizational domains are often largely taske...
Cyber-attacks are increasingly perpetrated by organised, sophisticated and persistent entities such ...
Cyber Threat Intelligence (CTI) sharing has become a novel weapon in the arsenal of cyber defenders ...
In this paper, insights are provided into how senior managers can establish a global cyber security ...
Cyber Threat Intelligence (CTI) can be used by organisations to assist their security teams in safeg...
Today cyber attacks, incidents, threats, and breaches continue to rise in scale and numbers, as soph...