Text Mining


Disseminating Information:

  • Within the company via email and workshop training
    • Development Teams - Identified threats against applications, source code, and repositories
    • Network Infrastructure Teams - Identified threats against network
  • Outside the company via shared forums and community boards to share information with other key electronic payment industry players

Actionable Intelligence Mitigation:

  • Cybersecurity teams to develop new standards for application development and source code storage
  • Update firewalls to block the TCP / UDP ports that network asset vulnerabilities exploit
  • Update intrusion prevention devices and web application firewalls with signatures identified to protect against network vulnerabilities and SQL injection attacks