

It states,“Together we can simplify the sharing of threat intelligence for organisations across the globe, creating a stronger community that drives adoption of intelligence as a core element of a prevention-based strategy. It encourages others in the security community to take up the banner and join the ecosystem by contributing a new Miner to the tool. MineMeld also supports a wide variety of open source intelligence providers.
#MIND MELD PUBLISHING CODE#
The source code is available on GitHub, as well as on pre-built virtual machines (VMs) for easy deployment.Īs part of the MineMeld release, it has partnered with some leading organisations to build a threat intelligence sharing ecosystem, with native support built into MineMeld from the very beginning, including Anomali, The Media Trust, Proofpoint, Recorded Future, Soltra, SpamHaus, as well as its AutoFocus service. An an open-source tool, MineMeld was built to be extensible, allowing organisations to tailor the input, processing, and output of information for their environments. Through MineMeld, organisations can integrate public, private, and commercial intelligence feeds, including results from other intelligence platforms, into a unified framework that natively feeds new prevention-based controls to Palo Alto Networks and other security devices. It is an open source tool that simplifies the aggregation, enforcement, and sharing of threat intelligence. As part of its commitment to the security community, and mission of driving a new era of threat intelligence sharing, Palo Alto Networks has announced the public availability of MineMeld to the entire security community. Traditional approaches have challenged security teams with complex workflows, across multiple tools, to aggregate a growing number of threat intelligence source, and drive enforcement down to local devices. To achieve the desired outcome of preventing cyber attacks, organisations must be able to action on collected indicators of compromise (IOCs), automatically transforming them into prevention-based controls for enforcement on security devices. It says the vision is clear: the more data you ingest, the more you can improve your risk posture.
