no code implementations • 29 Apr 2020 • Valentine Legoy, Marco Caselli, Christin Seifert, Andreas Peter
Over the last years, threat intelligence sharing has steadily grown, leading cybersecurity professionals to access increasingly larger amounts of heterogeneous data.