Cyber attacks have increased in frequency in recent years, affecting small, medium and large companies, creating an urgent need for tools capable of helping the mitigation of such threats. Thus, with the increasing number of cyber attacks, we have a large amount of threat data from heterogeneous sources that needs to be ingested, processed and analyzed in order to obtain useful insights for their mitigation. This study proposes a methodological framework to collect, organize, filter, share and visualize cyber-threat data to mitigate attacks and fix vulnerabilities, based on an eight-step cyber threat intelligence model with timeline visualization of threats information and analytic data insights. We developed a tool to address needs in whic...
As society ventures deeper into a technologically dependent realm, the need for cybersecurity contin...
Cyber insider threat is one of the most difficult risks to mitigate in organizations. However, innov...
In this thesis, extensions were developed for two commonly used threat intelligence platforms. The e...
Sharing Threat Intelligence is now one of the biggest trends in cyber security industry. Today, no o...
The ever-increasing amount of major security incidents has led to an emerging interest in cooperativ...
Amid the growing challenges of cybersecurity, the new paradigm of cyber threat intelligence (or CTI)...
The growing dependency on interconnected devices makes cyber crime increasingly lucrative. Together ...
Cyber security incidents have affected organisations from various industries. Malicious actors aim t...
Software vulnerabilities represent one of the main weaknesses of an Information Technology (IT) syst...
When talking about Cybersecurity, particularly in security incident response plan and processes it i...
In this paper we propose an approach for hunting adversarial tactics technics and procedures (TTPs)...
Tese de mestrado, Segurança Informática, Universidade de Lisboa, Faculdade de Ciências, 2019The Impa...
Securing the highly complex infrastructures of modern organizations against innovative and targeted ...
Cyber attacks are compromising networks faster than administrators can respond. Network defenders ar...
A comprehensive analysis of cyber attacks is important for better understanding of their nature and ...
As society ventures deeper into a technologically dependent realm, the need for cybersecurity contin...
Cyber insider threat is one of the most difficult risks to mitigate in organizations. However, innov...
In this thesis, extensions were developed for two commonly used threat intelligence platforms. The e...
Sharing Threat Intelligence is now one of the biggest trends in cyber security industry. Today, no o...
The ever-increasing amount of major security incidents has led to an emerging interest in cooperativ...
Amid the growing challenges of cybersecurity, the new paradigm of cyber threat intelligence (or CTI)...
The growing dependency on interconnected devices makes cyber crime increasingly lucrative. Together ...
Cyber security incidents have affected organisations from various industries. Malicious actors aim t...
Software vulnerabilities represent one of the main weaknesses of an Information Technology (IT) syst...
When talking about Cybersecurity, particularly in security incident response plan and processes it i...
In this paper we propose an approach for hunting adversarial tactics technics and procedures (TTPs)...
Tese de mestrado, Segurança Informática, Universidade de Lisboa, Faculdade de Ciências, 2019The Impa...
Securing the highly complex infrastructures of modern organizations against innovative and targeted ...
Cyber attacks are compromising networks faster than administrators can respond. Network defenders ar...
A comprehensive analysis of cyber attacks is important for better understanding of their nature and ...
As society ventures deeper into a technologically dependent realm, the need for cybersecurity contin...
Cyber insider threat is one of the most difficult risks to mitigate in organizations. However, innov...
In this thesis, extensions were developed for two commonly used threat intelligence platforms. The e...