Cyware, the industry’s only Virtual Cyber Fusion platform provider, today unveiled its new Cyware Threat Response Docker, a free, curated open-source solution that combines multiple open-source threat intelligence tools in one easy-to-access location to help analysts and researchers more efficiently analyze security data.
Built by Cyware, the new Docker image is a packaged collection of open-source threat intelligence feeds that enable users to automate and orchestrate various threat intelligence tasks, including data collection, extraction, and enrichment. By automating these key actions, security professionals can more efficiently curate threat intelligence data to automate manual threat intelligence tasks.
“The threat intelligence process can be incredibly exhaustive without the right supporting technologies and processes in place – there is no shortage of data to sift through to turn the noise into meaningful and actionable insights,” said Avkash Kathiriya, Vice President of Research and Innovation, Cyware. “Cyware is excited to deliver our new Threat Response Docker to the broader analyst and researcher community. With this new solution, security analysts can more easily tackle threat intelligence challenges with automation, freeing them up to focus on higher-level analysis and threat investigation to make key security decisions.”
Also Read: CISOs Must Transform Security Strategies in Age of Uncertainty
Cyware has enabled the capability through its new open-source solution for teams to improve the end-to-end threat intelligence process through:
- Threat intelligence gathering and collection of all intelligence and enrichment feeds.
- Extraction and processing of threat intelligence after the data is collected, such as reports and indicators that are extracted and standardized into ingestible formats.
- Analysis of the data collected and standardization across all indicators.
- Curation of OSINT into STIX format, enabling analysts to create, modify, standardize, disseminate, and ultimately share intelligence via STIX objects.
For more such updates follow us on Google News ITsecuritywire News. Please subscribe to our Newsletter for more updates.