The literature on cyber security information sharing enumerates an extensive list of potential benefits for organisations in both the public and private sectors. However, despite the potential benefits, successful cyber security information sharing has been difficult to achieve. We report upon a study that sought to measure the extent to which the benefits and barriers suggested by the cyber security information sharing literature are reflected in the attitudes of practising security managers and analysts. A self-administered online survey was used. The survey consisted of: several questions about the participants’ experience with cyber security information sharing; and two sets of Likert-type scale items to measure the respondents’ attitud...
peer reviewedThe ever-increasing scale and complexity of cyber attacks and cyber-criminal activities...
In the last few years the amount of witnessed accidents (such as stolen information) following from ...
The research area in question in this thesis is an analysis of success factors in information sharin...
There is an increased recognition of the importance of information sharing within cyber security. Ne...
Cyber security information sharing is increasingly playing an important role in improving the organi...
Once concentrated on protecting critical infrastructure, cyber security information sharing efforts ...
In a networked global economy, cyber security threats have accelerated at an enormous rate. The secu...
Active usage of threat intelligence information supports effective prevention, mitigation and defenc...
This article focuses on the importance of information sharing practices for capacity building compet...
Employees play a crucial role in enhancing information security in the workplace, and this requires ...
Cyber Threat Intelligence (CTI) sharing has become a novel weapon in the arsenal of cyber defenders ...
Cyber-threat information-sharing tools, through which cybersecurity teams share threat information, ...
This study aims to explore the types of information can be effectively communicated in three knowled...
International audienceSecurity information sharing (SIS) is an activity whereby individuals exchange...
Cyber threats are on the increase. Authorities need to respond to growing challenges by increasing c...
peer reviewedThe ever-increasing scale and complexity of cyber attacks and cyber-criminal activities...
In the last few years the amount of witnessed accidents (such as stolen information) following from ...
The research area in question in this thesis is an analysis of success factors in information sharin...
There is an increased recognition of the importance of information sharing within cyber security. Ne...
Cyber security information sharing is increasingly playing an important role in improving the organi...
Once concentrated on protecting critical infrastructure, cyber security information sharing efforts ...
In a networked global economy, cyber security threats have accelerated at an enormous rate. The secu...
Active usage of threat intelligence information supports effective prevention, mitigation and defenc...
This article focuses on the importance of information sharing practices for capacity building compet...
Employees play a crucial role in enhancing information security in the workplace, and this requires ...
Cyber Threat Intelligence (CTI) sharing has become a novel weapon in the arsenal of cyber defenders ...
Cyber-threat information-sharing tools, through which cybersecurity teams share threat information, ...
This study aims to explore the types of information can be effectively communicated in three knowled...
International audienceSecurity information sharing (SIS) is an activity whereby individuals exchange...
Cyber threats are on the increase. Authorities need to respond to growing challenges by increasing c...
peer reviewedThe ever-increasing scale and complexity of cyber attacks and cyber-criminal activities...
In the last few years the amount of witnessed accidents (such as stolen information) following from ...
The research area in question in this thesis is an analysis of success factors in information sharin...