Properties (65)
Predicate | Object |
---|---|
gptkbp:instanceOf |
gptkb:Company
|
gptkbp:analyzes |
Malware
Network Traffic Phishing Attacks Data Breaches Exploits Supply Chain Risks Botnets IoT Security Risks Social Engineering Attacks |
gptkbp:collaboratesWith |
Law Enforcement
Academic Institutions Cybersecurity Firms Security_Researchers |
gptkbp:conducts |
Webinars
|
gptkbp:contributedTo |
Open Source Intelligence
|
gptkbp:develops |
Security Policies
Security Tools Incident Response Plans Security Frameworks Detection Rules Threat Models |
gptkbp:employs |
Security Analysts
|
gptkbp:engagesIn |
Community Outreach
Incident Response Public Awareness Campaigns Vulnerability Disclosure Threat Intelligence Sharing |
gptkbp:focusesOn |
Cybersecurity
|
gptkbp:hosts |
Security_Conferences
|
https://www.w3.org/2000/01/rdf-schema#label |
Cisco Talos Intelligence
|
gptkbp:maintains |
Research Partnerships
Threat Intelligence Platform Threat Database |
gptkbp:offers |
Vulnerability Research
Webinars Threat Intelligence Platforms Threat Intelligence Feeds Incident Response Training Consulting_Services Threat_Intelligence_Services |
gptkbp:operatesIn |
Global Cybersecurity Landscape
|
gptkbp:participatesIn |
Industry Collaborations
Threat Hunting |
gptkbp:partOf |
gptkb:Cisco_Systems
|
gptkbp:provides |
Risk Assessments
Incident Reports Security Solutions Security Training Security Assessments Malware Analysis Security Metrics Threat Intelligence Reports Security Compliance Guidance |
gptkbp:publishes |
Blog Posts
Security Advisories |
gptkbp:released |
Research Papers
|
gptkbp:track |
Cyber Threats
Emerging Threats Ransomware Attacks Cybercrime Trends Advanced Persistent Threats (APTs) Vulnerability Trends |
gptkbp:utilizes |
Machine Learning
Data_Analytics |