full transcript

From the Ted Talk by Caleb Barlow: Where is cybercrime really coming from?

Unscramble the Blue Letters

But there was one conversation that kept floating to the sfarcue in every dialogue that we would have: the rotazeilain that if we didn't do this, then we were part of the proelbm. So we did something unheard of in the security industry. We started publishing. Over 700 terabytes of actionable threat intelligence data, including imofairtnon on real-time attacks that can be used to stop cybercrime in its tracks. And to date, over 4,000 organizations are lignvaereg this data, including half of the Fortune 100. And our hope as a next step is to get all of those organizations to join us in the fight, and do the same thing and share their information on when and how they're being atakcetd as well.

Open Cloze

But there was one conversation that kept floating to the _______ in every dialogue that we would have: the ___________ that if we didn't do this, then we were part of the _______. So we did something unheard of in the security industry. We started publishing. Over 700 terabytes of actionable threat intelligence data, including ___________ on real-time attacks that can be used to stop cybercrime in its tracks. And to date, over 4,000 organizations are __________ this data, including half of the Fortune 100. And our hope as a next step is to get all of those organizations to join us in the fight, and do the same thing and share their information on when and how they're being ________ as well.

Solution

  1. surface
  2. realization
  3. leveraging
  4. attacked
  5. problem
  6. information

Original Text

But there was one conversation that kept floating to the surface in every dialogue that we would have: the realization that if we didn't do this, then we were part of the problem. So we did something unheard of in the security industry. We started publishing. Over 700 terabytes of actionable threat intelligence data, including information on real-time attacks that can be used to stop cybercrime in its tracks. And to date, over 4,000 organizations are leveraging this data, including half of the Fortune 100. And our hope as a next step is to get all of those organizations to join us in the fight, and do the same thing and share their information on when and how they're being attacked as well.

Frequently Occurring Word Combinations

ngrams of length 2

collocation frequency
bad guys 4
security researchers 3
dyre wolf 3
bilal bot 3
threat intelligence 3
billion dollars 2
attack software 2
share information 2
attack techniques 2
security industry 2

Important Words

  1. actionable
  2. attacked
  3. attacks
  4. conversation
  5. cybercrime
  6. data
  7. date
  8. dialogue
  9. fight
  10. floating
  11. fortune
  12. hope
  13. including
  14. industry
  15. information
  16. intelligence
  17. join
  18. leveraging
  19. organizations
  20. part
  21. problem
  22. publishing
  23. realization
  24. security
  25. share
  26. started
  27. step
  28. stop
  29. surface
  30. terabytes
  31. threat
  32. tracks
  33. unheard