Security Experts:

Connect with us

Hi, what are you looking for?


Network Security

FireEye to Enable Customers to Share Threat Intelligence

Platform to Facilitate Broader Sharing of Threat Intelligence Obtained Through FireEye’s Platform

Platform to Facilitate Broader Sharing of Threat Intelligence Obtained Through FireEye’s Platform

Cyber threat protection firm FireEye announced a new initiative on Friday to enable its customers to exchange anonymized threat intelligence with their partners, customers, and other community members in order to better secure their organizations.

The Global Threat Intelligence Sharing initiative from the company leverages FireEye’s Community Threat Intelligence (CTI) platform and will allow customers to bi-directionally share threat intelligence in near real-time to members of a specific community. Shared intelligence can include indicators of compromise developed from threats that have been identified by FireEye’s global footprint of virtual machines.

FireEye LogoAdditionally, the CTI platform allows members of a community to augment and correlate global attack data with intelligence specifically gathered in their business environment, giving context for both widespread attacks and highly-targeted threat actors, Milpitas, Calif.–based FireEye said.

“Today’s threat landscape demands far more than just broad attack data being exchanged without any context for those receiving it,” said David DeWalt, chairman of the board and CEO, FireEye. “Protecting each other from commodity attacks is important, but, by creating an initiative to protect an entire community, FireEye will automate defenses for broad attacks and power different levels of context and customization to protect the community from targeted attacks.”

FireEye’s announcement was made on the same day President Obama is expected to announce executive action designed to improve how cyber threat information is shared between private sector firms and the U.S. Government at a White House cybersecurity summit at Stanford University.

Written By

For more than 10 years, Mike Lennon has been closely monitoring the threat landscape and analyzing trends in the National Security and enterprise cybersecurity space. In his role at SecurityWeek, he oversees the editorial direction of the publication and is the Director of several leading security industry conferences around the world.

Click to comment

Expert Insights

Related Content


Websites of German airports, administration bodies and banks were hit by DDoS attacks attributed to Russian hacker group Killnet

Network Security

NSA publishes guidance to help system administrators identify and mitigate cyber risks associated with transitioning to IPv6.

Threat Intelligence

How threat intelligence is critical when justifying budget for GRC personnel, and for threat intelligence, incident response, security operations and CISO buyers.

Identity & Access

Hackers rarely hack in anymore. They log in using stolen, weak, default, or otherwise compromised credentials. That’s why it’s so critical to break the...

Cybersecurity Funding

Forward Networks, a company that provides network security and reliability solutions, has raised $50 million from several investors.


The degree of danger that may be introduced when adversaries start to use AI as an effective weapon of attack rather than a tool...


Cybercriminals earned significantly less from ransomware attacks in 2022 compared to 2021 as victims are increasingly refusing to pay ransom demands.

Network Security

Cisco patched a high-severity SQL injection vulnerability in Unified Communications Manager (CM) and Unified Communications Manager Session Management Edition (CM SME).