Statements (89)
Predicate | Object |
---|---|
gptkbp:instanceOf |
gptkb:Company
|
gptkbp:analyzes |
gptkb:Ransomware
gptkb:Digital_Forensics Malware Network Security Network Traffic Phishing Attacks Web Application Security Data Breaches Cloud Security Mobile Security IoT Security Supply Chain Attacks |
gptkbp:collaboratesWith |
Government Agencies
Law Enforcement Academic Institutions Industry Partners Non-Profit_Organizations Security_Community |
gptkbp:conducts |
Workshops
Webinars Threat Assessments Threat Research Security Evaluations |
gptkbp:develops |
Security Tools
Incident Response Plans Security Frameworks Incident Response Frameworks Detection Rules Threat_Detection_Strategies |
gptkbp:engagesIn |
Community Outreach
Incident Response Public Awareness Campaigns Threat Mitigation Threat Analysis Policy Advocacy Research Projects Cyber Threat Intelligence Sharing Cybersecurity_Research Cybersecurity_Awareness_Programs |
gptkbp:focusesOn |
Cybersecurity
|
https://www.w3.org/2000/01/rdf-schema#label |
Cisco Talos
|
gptkbp:maintains |
gptkb:Threat_Intelligence_Network
Incident Response Team Research Blog Threat Database Threat_Intelligence_Portal |
gptkbp:offers |
Training Programs
Security Audits Risk Assessment Services Threat Intelligence Reports Threat Hunting Services Consulting_Services Security_Consulting Incident_Management_Services Incident_Response_Services Security_Research Vulnerability_Management_Services Security_Risk_Management_Services |
gptkbp:operatesIn |
Global Cybersecurity Landscape
|
gptkbp:participatesIn |
Conferences
|
gptkbp:partOf |
gptkb:Cisco_Systems
|
gptkbp:provides |
Threat Intelligence
Webinars Security Awareness Training Security Tools Security Solutions Vulnerability Assessments Threat Intelligence Feeds Security Assessments Malware Analysis Incident Response Training Security Incident Reports Security_Compliance_Services |
gptkbp:publishes |
Blog Posts
Security Reports |
gptkbp:released |
Security Advisories
|
gptkbp:supports |
Open Source Intelligence
|
gptkbp:track |
Cyber Attacks
Data Protection Laws Advanced Persistent Threats Vulnerabilities Exploits Emerging Threats Cybersecurity Trends Cybersecurity Incidents Cyber Threat Actors Cybersecurity_Regulations |
gptkbp:utilizes |
Machine Learning
|