* [Blog](https://www2.paloaltonetworks.com/blog) * [Palo Alto Networks](https://www2.paloaltonetworks.com/blog/corporate/) * [Points of View](https://www2.paloaltonetworks.com/blog/category/points-of-view/) * Stoked --- Manifesting Inno... # Stoked --- Manifesting Innovation in Shared Threat Intelligence [](https://www.facebook.com/sharer/sharer.php?u=https%3A%2F%2Fwww2.paloaltonetworks.com%2Fblog%2F2024%2F11%2Finnovation-in-shared-threat-intelligence%2F) [](https://twitter.com/share?text=Stoked+%E2%80%94+Manifesting+Innovation+in+Shared+Threat+Intelligence&url=https%3A%2F%2Fwww2.paloaltonetworks.com%2Fblog%2F2024%2F11%2Finnovation-in-shared-threat-intelligence%2F) [](https://www.linkedin.com/shareArticle?mini=true&url=https%3A%2F%2Fwww2.paloaltonetworks.com%2Fblog%2F2024%2F11%2Finnovation-in-shared-threat-intelligence%2F&title=Stoked+%E2%80%94+Manifesting+Innovation+in+Shared+Threat+Intelligence&summary=&source=) [](https://www.paloaltonetworks.com//www.reddit.com/submit?url=https://www2.paloaltonetworks.com/blog/2024/11/innovation-in-shared-threat-intelligence/&ts=markdown) \[\](mailto:?subject=Stoked — Manifesting Innovation in Shared Threat Intelligence) Link copied By [Dena De Angelo](https://www.paloaltonetworks.com/blog/author/ddeangelo/?ts=markdown "Posts by Dena De Angelo") Nov 25, 2024 6 minutes [Points of View](https://www.paloaltonetworks.com/blog/category/points-of-view/?ts=markdown) [Threat Prevention](https://www.paloaltonetworks.com/blog/category/threat-prevention-2/?ts=markdown) [hackers](https://www.paloaltonetworks.com/blog/tag/hackers/?ts=markdown) [Open Source](https://www.paloaltonetworks.com/blog/tag/open-source/?ts=markdown) [threat intelligence](https://www.paloaltonetworks.com/blog/tag/threat-intelligence/?ts=markdown) The ethos of skateboarding is born out of a maverick spirit. It's wrought from verve and a stubborn determination to flow on one's own terms. There's a subtle rebelliousness in carving out tight lines along hot asphalt, propelled forward by one's own power. Challenged by your physical environment, you go for it -- bombing down a hill or grinding out a curb, making the most of exposed surfaces. You skate because you can. And, like skaters sharing new tricks, threat intelligence thrives on collective discovery. It's pretty rad. ## From Blasé to Bad Ass I was recently turned on to a[TED talk](https://www.ted.com/talks/rodney_mullen_pop_an_ollie_and_innovate?language=en)that legendary skateboarder Rodney Mullen gave back in 2014. Considered the "Godfather of Modern Street Skating," Mullen is credited with inventing the flat ground Ollie that revolutionized skateboarding. His ability to manipulate the board, launching it up and over objects, helped morph the sport from the sedate motions of freestyle to the gritty contortions that define modern street skating. All of the sudden, skate-able terrain included seemingly impossible features, like stairs and handrails. > ...all skateboarders speak a language of our own devising. We take simple movements and chunk them together in such a way that we form more complex ones. *---Rodney Mullen* About half way through his lecture he drew similarities between skaters, hackers and the open-source community. Say what? He surmises that these communities are similar, each conducive to innovation and collaboration. And he makes some good supporting points, like no one person "owns" a trick. They are shared, learned, modified and shared again among peers. The creative process of developing code or creating a new trick are as much about breaking barriers as they are about raising a proverbial fist and shouting expletives in triumph at the status quo. Writing and committing clean code provides its own rush --- a by-product of the creative process. Rodney shares more insights on his comparison: "They connect disparate information, and they bring it together in a way that a security analyst doesn't expect. It doesn't make them good people, but it's at the heart of engineering, at the heart of a creative community, an innovative community and the open-source community, the basic ethos of it is, take what other people do, make it better, give it back so we all rise further." He frames his skateboarder/hacker/security analyst analogy with anecdotes that highlight the altruistic contributions to the process --- whether it be engineering or skateboarding --- and then seeing the creation take on a life of its own when others embrace it. "...we all rise further." Think about that. The result is a richer, organic by-product, a version of a vision that found expression and became reality. It's a beautiful thing. And yet, like skateboarding, open-source software (OSS) also carries substantial risks and vulnerabilities. But first, what exactly is open-source software? Generally speaking, it is software that can be freely accessed, changed, used and shared by anyone. The Open Source Initiative's definition outlines 10 criteria that must be met by any software license to be labeled as such, including free redistribution, integrity of the author's source code, technology neutrality and no discrimination against persons or groups. OSS enables organizations to continuously improve and deliver quality products. Using it can help accelerate development schedules, reduce licensing costs, and better leverage personnel. Like skating, large user communities share an interest in quickly finding solutions to do something better. #### In the case of security folks, it's in identifying and fixing vulnerabilities. ## Skate at Your Own Risk (Management) The [Cybersecurity and Infrastructure Security Agency (CISA](https://www.cisa.gov/resources-tools/services/cyber-threat-information-sharing-ctis-automated-indicator-sharing-ais)) defines threat intelligence sharing as a key part of a robust cybersecurity program. It enables organizations to leverage the knowledge, experience and capabilities of a broader community to improve their security posture. Threat intelligence sharing enables organizations to continuously improve and deliver quality security. It's flexible, cost-effective and fast. Using it can help accelerate threat detection, reduce incident response times, and better leverage personnel. In the spirit of open source, the threat intelligence community operates on similar principles of collaboration and shared knowledge. Security researchers, analysts and organizations worldwide contribute to a pool of information about emerging threats, vulnerabilities and attack patterns. This collaborative approach allows for rapid dissemination of critical intelligence, enabling faster response times and more robust defenses across the cybersecurity landscape. A prime example of this collaborative approach in action is the [Cyber Threat Alliance (CTA)](https://www.cyberthreatalliance.org/). Founded in 2014, the CTA is a non-profit organization that exemplifies the skateboarding collective Mullen describes. This alliance facilitates the exchange of timely, actionable threat intelligence, fostering a shared defense against cyberthreats. The CTA's automated threat intelligence sharing platform allows members to exchange information on malware, phishing, mobile threats and other malicious activities. This real-time collaboration enables cybersecurity professionals to anticipate, identify and respond to threats more quickly and effectively. As a founding member of CTA, Palo Alto Networks Unit 42 has its own [partnership program for sharing threat intelligence](https://www.paloaltonetworks.com/unit42/threat-intelligence-partners). This also includes partnering with the U.S. Department of Homeland Security, the intelligence community at-large, international law enforcement and government agencies. Another example of this collaboration in cybersecurity is [VirusTotal](https://www.virustotal.com/gui/home/upload) which serves as a hub where security professionals and everyday users alike can contribute to and benefit from communal threat intelligence. Founded in 2004 and later acquired by Google, VirusTotal allows users to upload suspicious files or URLs, which are then analyzed by multiple antivirus engines and website scanners. The results are shared openly, creating a vast, continuously updated repository of threat data. ## Sharing Is Caring Much like skateboarders sharing new tricks or open-source developers contributing code, threat intelligence professionals share indicators of compromise, malware signatures and attack methodologies. This communal effort helps to create a more comprehensive and up to date view of the threat landscape, allowing organizations to stay ahead of potential attacks. However, this open approach also comes with its own set of challenges. The sheer volume of shared information can be overwhelming, and not all intelligence is equally reliable or relevant. Organizations must carefully vet and contextualize the intelligence they receive, adapting it to their specific environment and risk profile. Moreover, threat actors can potentially exploit this openness by injecting false information or using the shared knowledge to refine their attack techniques. This creates a constant cat-and-mouse game where both defenders and attackers evolve their strategies based on the latest shared intelligence. Despite these challenges, the benefits of collaborative threat intelligence far outweigh the risks. By fostering a community that values sharing, learning and continuous improvement, the cybersecurity world can better defend against the ever-evolving threat landscape. In this way, the threat intelligence community embodies the same innovation and mutual progress that Rodney observed. So, embrace your inner Caballero, Hawk or Torvalds. Code. Skate. Code some more. And if you're going to commit, do so with the utmost confidence that Mullen has your back. Oh, and stickers. There are always stickers, should you need a moment of further self-expression. ## Stay in the Security Flow Transform your SOC with [Cortex®](https://www.paloaltonetworks.com/cortex) and [Unit 42](https://unit42.paloaltonetworks.com/). *** ** * ** *** ## Related Blogs ### [Announcement](https://www.paloaltonetworks.com/blog/category/announcement/?ts=markdown), [Must-Read Articles](https://www.paloaltonetworks.com/blog/security-operations/category/must-read-articles/?ts=markdown), [Points of View](https://www.paloaltonetworks.com/blog/category/points-of-view/?ts=markdown) [#### We Can't Do It Alone: Sharing Threat Intelligence Makes Everyone Safer](https://www2.paloaltonetworks.com/blog/2023/06/sharing-threat-intelligence/) ### [Cybersecurity](https://www.paloaltonetworks.com/blog/category/cybersecurity-2/?ts=markdown), [Education](https://www.paloaltonetworks.com/blog/category/education/?ts=markdown), [Points of View](https://www.paloaltonetworks.com/blog/category/points-of-view/?ts=markdown), [Use-Cases](https://www.paloaltonetworks.com/blog/sase/category/use-cases/?ts=markdown) [#### Why Hackers Like Your Remote Access and What You Can Do About It](https://www2.paloaltonetworks.com/blog/2021/06/why-hackers-like-your-remote-access/) ### [Cybersecurity Canon](https://www.paloaltonetworks.com/blog/category/canon/?ts=markdown), [Points of View](https://www.paloaltonetworks.com/blog/category/points-of-view/?ts=markdown) [#### Book Review: Cult of the Dead Cow](https://www2.paloaltonetworks.com/blog/2020/01/cyber-canon-cult-of-the-dead-cow/) ### [Cybersecurity](https://www.paloaltonetworks.com/blog/category/cybersecurity-2/?ts=markdown), [Threat Prevention](https://www.paloaltonetworks.com/blog/category/threat-prevention-2/?ts=markdown) [#### Why You Need Actionable Threat Intelligence](https://www2.paloaltonetworks.com/blog/2017/05/need-actionable-threat-intelligence/) ### [Announcement](https://www.paloaltonetworks.com/blog/category/announcement/?ts=markdown), [Incident Response](https://www.paloaltonetworks.com/blog/category/incident-response/?ts=markdown), [Products and Services](https://www.paloaltonetworks.com/blog/category/products-and-services/?ts=markdown), [Threat Prevention](https://www.paloaltonetworks.com/blog/category/threat-prevention-2/?ts=markdown), [Unit 42](https://unit42-dev2.paloaltonetworks.com) [#### Introducing Unit 42 Managed XSIAM 2.0](https://www2.paloaltonetworks.com/blog/2026/02/introducing-unit-42-managed-xsiam-2-0/) ### [AI and Cybersecurity](https://www.paloaltonetworks.com/blog/security-operations/category/ai-and-cybersecurity/?ts=markdown), [AI Security](https://www.paloaltonetworks.com/blog/category/ai-security/?ts=markdown), [Interview](https://www.paloaltonetworks.com/blog/category/interview/?ts=markdown), [Must-Read Articles](https://www.paloaltonetworks.com/blog/security-operations/category/must-read-articles/?ts=markdown), [People of Palo Alto Networks](https://www.paloaltonetworks.com/blog/category/people-of-palo-alto-networks/?ts=markdown), [Points of View](https://www.paloaltonetworks.com/blog/category/points-of-view/?ts=markdown) [#### When Security Becomes an Afterthought](https://www2.paloaltonetworks.com/blog/2026/02/when-security-becomes-an-afterthought/) ### Subscribe to the Blog! Sign up to receive must-read articles, Playbooks of the Week, new feature announcements, and more. ![spinner](https://www2.paloaltonetworks.com/blog/wp-content/themes/panwblog2023/dist/images/ajax-loader.gif) Sign up Please enter a valid email. By submitting this form, you agree to our [Terms of Use](https://www.paloaltonetworks.com/legal-notices/terms-of-use?ts=markdown) and acknowledge our [Privacy Statement](https://www.paloaltonetworks.com/legal-notices/privacy?ts=markdown). Please look for a confirmation email from us. If you don't receive it in the next 10 minutes, please check your spam folder. This site is protected by reCAPTCHA and the Google [Privacy Policy](https://policies.google.com/privacy) and [Terms of Service](https://policies.google.com/terms) apply. {#footer} {#footer} ## Products and Services * [AI-Powered Network Security Platform](https://www.paloaltonetworks.com/network-security?ts=markdown) * [Secure AI by Design](https://www.paloaltonetworks.com/precision-ai-security/secure-ai-by-design?ts=markdown) * [Prisma AIRS](https://www.paloaltonetworks.com/prisma/prisma-ai-runtime-security?ts=markdown) * [AI Access Security](https://www.paloaltonetworks.com/sase/ai-access-security?ts=markdown) * [Cloud Delivered Security Services](https://www.paloaltonetworks.com/network-security/security-subscriptions?ts=markdown) * [Advanced Threat Prevention](https://www.paloaltonetworks.com/network-security/advanced-threat-prevention?ts=markdown) * [Advanced URL Filtering](https://www.paloaltonetworks.com/network-security/advanced-url-filtering?ts=markdown) * [Advanced WildFire](https://www.paloaltonetworks.com/network-security/advanced-wildfire?ts=markdown) * [Advanced DNS Security](https://www.paloaltonetworks.com/network-security/advanced-dns-security?ts=markdown) * [Enterprise Data Loss Prevention](https://www.paloaltonetworks.com/sase/enterprise-data-loss-prevention?ts=markdown) * [Enterprise IoT Security](https://www.paloaltonetworks.com/network-security/enterprise-device-security?ts=markdown) * [Medical IoT Security](https://www.paloaltonetworks.com/network-security/medical-device-security?ts=markdown) * [Industrial OT Security](https://www.paloaltonetworks.com/network-security/medical-device-security?ts=markdown) * [SaaS Security](https://www.paloaltonetworks.com/sase/saas-security?ts=markdown) * [Next-Generation Firewalls](https://www.paloaltonetworks.com/network-security/next-generation-firewall?ts=markdown) * [Hardware Firewalls](https://www.paloaltonetworks.com/network-security/hardware-firewall-innovations?ts=markdown) * [Software Firewalls](https://www.paloaltonetworks.com/network-security/software-firewalls?ts=markdown) * [Strata Cloud Manager](https://www.paloaltonetworks.com/network-security/strata-cloud-manager?ts=markdown) * [SD-WAN for NGFW](https://www.paloaltonetworks.com/network-security/sd-wan-subscription?ts=markdown) * [PAN-OS](https://www.paloaltonetworks.com/network-security/pan-os?ts=markdown) * [Panorama](https://www.paloaltonetworks.com/network-security/panorama?ts=markdown) * [Secure Access Service Edge](https://www.paloaltonetworks.com/sase?ts=markdown) * [Prisma SASE](https://www.paloaltonetworks.com/sase?ts=markdown) * [Application Acceleration](https://www.paloaltonetworks.com/sase/app-acceleration?ts=markdown) * [Autonomous Digital Experience Management](https://www.paloaltonetworks.com/sase/adem?ts=markdown) * [Enterprise DLP](https://www.paloaltonetworks.com/sase/enterprise-data-loss-prevention?ts=markdown) * [Prisma Access](https://www.paloaltonetworks.com/sase/access?ts=markdown) * [Prisma Browser](https://www.paloaltonetworks.com/sase/prisma-browser?ts=markdown) * [Prisma SD-WAN](https://www.paloaltonetworks.com/sase/sd-wan?ts=markdown) * [Remote Browser Isolation](https://www.paloaltonetworks.com/sase/remote-browser-isolation?ts=markdown) * [SaaS Security](https://www.paloaltonetworks.com/sase/saas-security?ts=markdown) * [AI-Driven Security Operations Platform](https://www.paloaltonetworks.com/cortex?ts=markdown) * [Cloud Security](https://www.paloaltonetworks.com/cortex/cloud?ts=markdown) * [Cortex Cloud](https://www.paloaltonetworks.com/cortex/cloud?ts=markdown) * [Application Security](https://www.paloaltonetworks.com/cortex/cloud/application-security?ts=markdown) * [Cloud Posture Security](https://www.paloaltonetworks.com/cortex/cloud/cloud-posture-security?ts=markdown) * [Cloud Runtime Security](https://www.paloaltonetworks.com/cortex/cloud/runtime-security?ts=markdown) * [Prisma Cloud](https://www.paloaltonetworks.com/prisma/cloud?ts=markdown) * [AI-Driven SOC](https://www.paloaltonetworks.com/cortex?ts=markdown) * [Cortex XSIAM](https://www.paloaltonetworks.com/cortex/cortex-xsiam?ts=markdown) * [Cortex XDR](https://www.paloaltonetworks.com/cortex/cortex-xdr?ts=markdown) * [Cortex XSOAR](https://www.paloaltonetworks.com/cortex/cortex-xsoar?ts=markdown) * [Cortex Xpanse](https://www.paloaltonetworks.com/cortex/cortex-xpanse?ts=markdown) * [Unit 42 Managed Detection \& Response](https://www.paloaltonetworks.com/cortex/managed-detection-and-response?ts=markdown) * [Managed XSIAM](https://www.paloaltonetworks.com/cortex/managed-xsiam?ts=markdown) * [Threat Intel and Incident Response Services](https://www.paloaltonetworks.com/unit42?ts=markdown) * [Proactive Assessments](https://www.paloaltonetworks.com/unit42/assess?ts=markdown) * [Incident Response](https://www.paloaltonetworks.com/unit42/respond?ts=markdown) * [Transform Your Security Strategy](https://www.paloaltonetworks.com/unit42/transform?ts=markdown) * [Discover Threat Intelligence](https://www.paloaltonetworks.com/unit42/threat-intelligence-partners?ts=markdown) ## Company * [About Us](https://www.paloaltonetworks.com/about-us?ts=markdown) * [Careers](https://jobs.paloaltonetworks.com/en/) * [Contact Us](https://www.paloaltonetworks.com/company/contact-sales?ts=markdown) * [Corporate Responsibility](https://www.paloaltonetworks.com/about-us/corporate-responsibility?ts=markdown) * [Customers](https://www.paloaltonetworks.com/customers?ts=markdown) * [Investor Relations](https://investors.paloaltonetworks.com/) * [Location](https://www.paloaltonetworks.com/about-us/locations?ts=markdown) * [Newsroom](https://www.paloaltonetworks.com/company/newsroom?ts=markdown) ## Popular Links * [Blog](https://www.paloaltonetworks.com/blog/?ts=markdown) * [Communities](https://www.paloaltonetworks.com/communities?ts=markdown) * [Content Library](https://www.paloaltonetworks.com/resources?ts=markdown) * [Cyberpedia](https://www.paloaltonetworks.com/cyberpedia?ts=markdown) * [Event Center](https://events.paloaltonetworks.com/) * [Manage Email Preferences](https://start.paloaltonetworks.com/preference-center) * [Products A-Z](https://www.paloaltonetworks.com/products/products-a-z?ts=markdown) * [Product Certifications](https://www.paloaltonetworks.com/legal-notices/trust-center/compliance?ts=markdown) * [Report a Vulnerability](https://www.paloaltonetworks.com/security-disclosure?ts=markdown) * [Sitemap](https://www.paloaltonetworks.com/sitemap?ts=markdown) * [Tech Docs](https://docs.paloaltonetworks.com/) * [Unit 42](https://unit42.paloaltonetworks.com/) * [Do Not Sell or Share My Personal Information](https://panwedd.exterro.net/portal/dsar.htm?target=panwedd) ![PAN logo](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/pan-logo-dark.svg) * [Privacy](https://www.paloaltonetworks.com/legal-notices/privacy?ts=markdown) * [Trust Center](https://www.paloaltonetworks.com/legal-notices/trust-center?ts=markdown) * [Terms of Use](https://www.paloaltonetworks.com/legal-notices/terms-of-use?ts=markdown) * [Documents](https://www.paloaltonetworks.com/legal?ts=markdown) Copyright © 2026 Palo Alto Networks. All Rights Reserved * [![Youtube](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/social/youtube-black.svg)](https://www.youtube.com/user/paloaltonetworks) * [![Podcast](https://www.paloaltonetworks.com/content/dam/pan/en_US/images/icons/podcast.svg)](https://www.paloaltonetworks.com/podcasts/threat-vector?ts=markdown) * [![Facebook](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/social/facebook-black.svg)](https://www.facebook.com/PaloAltoNetworks/) * [![LinkedIn](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/social/linkedin-black.svg)](https://www.linkedin.com/company/palo-alto-networks) * [![Twitter](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/social/twitter-x-black.svg)](https://twitter.com/PaloAltoNtwks) * EN Select your language