Archived Content

In an effort to keep CISA.gov current, the archive contains outdated information that may not reflect current policy or programs.
PUBLICATION

Preserving Cyber Threat Intelligence Content White Paper

Revision Date

Operational limitations have resulted in many organizations deploying 3rd party products to ingest standards-based Cyber Threat Intelligence (CTI) feeds. Unfortunately, many of these products modify the shared content when they receive it from the producer. Often the methods utilized for CTI delivery through 3rd party sharing infrastructure results in limitations regarding the usefulness of new or unique CTI and nullifies the expected value of using community accepted standards.