full transcript
From the Ted Talk by Caleb Barlow: Where is cybercrime really coming from?
Unscramble the Blue Letters
Unfortunately, this is not at all what we see in rpessone to a cyber attack. Organizations are far more likely to keep itrooafinmn on that attack to themselves. Why? Because they're worried about competitive advantage, laogiititn or rtolgeiuan. We need to effectively democratize threat intelligence data. We need to get all of these organizations to open up and share what is in their private arsenal of information. The bad guys are moving fast; we've got to move faster. And the best way to do that is to open up and share data on what's hapenpnig.
Open Cloze
Unfortunately, this is not at all what we see in ________ to a cyber attack. Organizations are far more likely to keep ___________ on that attack to themselves. Why? Because they're worried about competitive advantage, __________ or __________. We need to effectively democratize threat intelligence data. We need to get all of these organizations to open up and share what is in their private arsenal of information. The bad guys are moving fast; we've got to move faster. And the best way to do that is to open up and share data on what's _________.
Solution
- response
- information
- happening
- litigation
- regulation
Original Text
Unfortunately, this is not at all what we see in response to a cyber attack. Organizations are far more likely to keep information on that attack to themselves. Why? Because they're worried about competitive advantage, litigation or regulation. We need to effectively democratize threat intelligence data. We need to get all of these organizations to open up and share what is in their private arsenal of information. The bad guys are moving fast; we've got to move faster. And the best way to do that is to open up and share data on what's happening.
Frequently Occurring Word Combinations
ngrams of length 2
collocation |
frequency |
bad guys |
4 |
security researchers |
3 |
dyre wolf |
3 |
bilal bot |
3 |
threat intelligence |
3 |
billion dollars |
2 |
attack software |
2 |
share information |
2 |
attack techniques |
2 |
security industry |
2 |
Important Words
- advantage
- arsenal
- attack
- bad
- competitive
- cyber
- data
- democratize
- effectively
- faster
- guys
- happening
- information
- intelligence
- litigation
- move
- moving
- open
- organizations
- private
- regulation
- response
- share
- threat
- worried