Symantec Threat Intelligence Team
GPTKB entity
Statements (74)
Predicate | Object |
---|---|
gptkbp:instance_of |
gptkb:software
|
gptkbp:bfsLayer |
6
|
gptkbp:bfsParent |
gptkb:Symantec_Web_Security
|
gptkbp:analyzes |
Data breaches
Advanced persistent threats Phishing attacks Malware threats Supply chain risks Social engineering attacks Mobile security threats Io T security risks Ransomware incidents Cloud security risks |
gptkbp:collaborates_with |
gptkb:Non-profit_organizations
Academic institutions Government agencies Industry partners Law enforcement agencies |
gptkbp:conducts |
Webinars
Threat assessments |
gptkbp:develops |
Cyber defense strategies
Incident response plans Security frameworks Security tools Incident management processes Cybersecurity awareness campaigns Cybersecurity policies Threat detection strategies |
gptkbp:engages_in |
Community outreach programs
Policy advocacy Public outreach Threat hunting Vulnerability disclosure programs Threat intelligence collaborations Threat intelligence workshops |
gptkbp:focuses_on |
gptkb:Company
|
https://www.w3.org/2000/01/rdf-schema#label |
Symantec Threat Intelligence Team
|
gptkbp:monitors |
Dark web activities
Global cyber threats |
gptkbp:offers |
Penetration testing services
Training programs Consulting services Risk assessments Security assessments Incident response services |
gptkbp:part_of |
gptkb:Symantec_Corporation
|
gptkbp:participates_in |
Cybersecurity conferences
Cybersecurity drills Cybersecurity research initiatives Threat intelligence sharing platforms Threat sharing initiatives |
gptkbp:provides |
Forensic analysis
Vulnerability assessments Incident reports Security advisories Threat intelligence feeds Threat intelligence reports Security awareness training Incident response training Security incident management Malware analysis services |
gptkbp:publishes |
Research papers
Threat landscape reports |
gptkbp:track |
Emerging threats
Cybersecurity trends Cybersecurity incidents Cybersecurity regulations Cybersecurity vulnerabilities Cybercriminal activities Nation-state threats |
gptkbp:utilizes |
Machine learning
Data analytics Threat intelligence platforms |
gptkbp:works_with |
Other cybersecurity firms
|