{"id":11869,"date":"2024-01-02T13:55:12","date_gmt":"2024-01-02T05:55:12","guid":{"rendered":"https:\/\/starshot.tw\/?page_id=11869"},"modified":"2024-04-09T17:03:07","modified_gmt":"2024-04-09T09:03:07","slug":"threat-intelligence","status":"publish","type":"page","link":"https:\/\/starshot.tw\/solutions\/cybersecuritysolutions\/threat-intelligence\/","title":{"rendered":"\u5a01\u8105\u60c5\u8cc7\u8207\u4f01\u696d\u8cc7\u5b89\u5831\u544a\u670d\u52d9\uff5cThreat Intelligence"},"content":{"rendered":"\t\t
\u5a01\u8105\u60c5\u8cc7(threat intelligence)\u6216\u7a31\u7db2\u8def\u5a01\u8105\u60c5\u8cc7\u3001\u8cc7\u5b89\u60c5\u8cc7(cyber threat intelligence,CTI) \uff0c\u662f\u6307\u6709\u95dc\u6f5b\u5728\u5a01\u8105\u3001\u6f0f\u6d1e\u548c\u53ef\u80fd\u88ab\u5229\u7528\u7684\u5f31\u9ede\u7b49\u65b9\u9762\u7684\u8cc7\u8a0a\u3002\u5a01\u8105\u60c5\u5831\u80fd\u5920\u6709\u52a9\u65bc\u4f01\u696d\u3001\u7d44\u7e54\u6216\u500b\u4eba\u4e86\u89e3\u7576\u524d\u7684\u5a01\u8105\u666f\u89c0\u548c\u6f5b\u5728\u7684\u98a8\u96aa\uff0c\u9032\u800c\u5354\u52a9\u7ba1\u7406\u65b9\u5236\u5b9a\u8cc7\u5b89\u6c7a\u7b56\u3002<\/p>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t