Just one of the things that's quite interesting about the document is the combination of the Security Content Automation Protocol and the work of the Trusted Computing Group. I have noted that these two belong together... in other forums.
Isn't it fascinating that, arguably, one of the most important international cyber security "information sharing" efforts... this one headed by the ITU... is relying upon Trusted Computing to make certain that the threat information is itself trustworthy?
Register for free to join our community of investors and share your ideas. You will also get access to streaming quotes, interactive charts, trades, portfolio, live options flow and more tools.