Text Mining
Disseminating Information:
- Within the company via email and workshop training
- Development Teams - Identified threats against applications, source code, and repositories
- Network Infrastructure Teams - Identified threats against network
- Outside the company via shared forums and community boards to share information with other key electronic payment industry players
Actionable Intelligence Mitigation:
- Cybersecurity teams to develop new standards for application development and source code storage
- Update firewalls to block the TCP / UDP ports that network asset vulnerabilities exploit
- Update intrusion prevention devices and web application firewalls with signatures identified to protect against network vulnerabilities and SQL injection attacks