Threat Sharing
6. FAQ
Q: Can I hide my identity when I post an incident to a community?
Q: How do I launch an investigation to assess the threat at my company?
Q: Is it possible to invite someone from a company that is not currently a client to join a community?
Q: Where are shared incidents stored?
Q: What is the reliability of shared posts/incidents?
Q: Are shared threats/incidents/posts human-verified?
Q: Is there any limit to the number of posts that can shared in a community?
Q: Is it possible to leave a community of which I am the owner? Can I transfer ownership?
Q: What is the reliability of shared posts/incidents?
7. Use Cases
Use Case: Keep details private when posting an incident to avoid exposing confidential information
Use Case: Limit membership to a community
Use Case: Find communities related to a particular industry or sector
Use Case: There are no communities related to my sector. What can I do?
Use Case: Searching for specific incidents in the threat sharing database
Use Case: Assessing the threat of an incident
Use Case: Using invitations to grow a community and improve security posture
Use Case: Ensuring and enhancing the value of a community for the owner and members
Use Case: Defining the purpose of a community
Use Case: What action can community members take in response to a posted incident?
Use Case: The community has lost its way. How can it be saved?
Last updated