Kim, an analyst, is looking for an intelligence-sharing platform to gather and share threat information from a variety of sources. He wants to use this information to develop security policies to enhance the overall security posture of his organization.
Which of the following sharing platforms should be used by Kim?
Junita
4 months agoPhillip
4 months agoJoaquin
4 months agoAmina
4 months agoMitsue
5 months agoElena
5 months agoDavida
5 months agoSabra
5 months agoJuliana
5 months agoAmie
5 months agoLayla
5 months agoElza
5 months agoGail
5 months ago