{"id":9765,"date":"2019-01-29T14:28:00","date_gmt":"2019-01-29T21:28:00","guid":{"rendered":"https:\/\/swimlane.com\/resource\/sharing-content-improves-incident-response\/"},"modified":"2026-03-03T04:20:27","modified_gmt":"2026-03-03T11:20:27","slug":"%ec%bd%98%ed%85%90%ec%b8%a0-%ea%b3%b5%ec%9c%a0%eb%8a%94-%ec%82%ac%ea%b1%b4-%eb%8c%80%ec%9d%91%ec%9d%84-%ed%96%a5%ec%83%81%ec%8b%9c%ed%82%b5%eb%8b%88%eb%8b%a4","status":"publish","type":"sw_resource","link":"https:\/\/swimlane.com\/ko\/blog\/sharing-content-improves-incident-response\/","title":{"rendered":"\ucf58\ud150\uce20 \uacf5\uc720\uac00 \uc0ac\uac74 \ub300\uc751\uc744 \uac1c\uc120\ud558\ub294 \ubc29\ubc95"},"content":{"rendered":"\n\n\n<section class=\"bs-section bs-section-50ac0cc438dbf2f3b380783c05a3c736bb0670e7 bs-section---default bs-section--blog-inner-banner  \"><style>.bs-section.bs-section-50ac0cc438dbf2f3b380783c05a3c736bb0670e7{ background-color: #000743;} <\/style><div class=\"container\">\n<div class=\"bs-row row  flex-md-row-reverse bs-row---default\">\n<div class=\" bs-column col-sm-12 col-md-12 col-lg-6   bs-column-6770b3369b6c61539d3140cb52ed6bc5ec393625 bs-column---default bs-column--right d-flex flex-column justify-content-end    \"><figure class=\"wp-block-post-featured-image\"><img decoding=\"async\" src=\"https:\/\/swimlane.com\/wp-content\/uploads\/How-sharing-content-can-improve-threat-response.png\" class=\"attachment-post-thumbnail size-post-thumbnail wp-post-image\" alt=\"Thought leadership graphic on sharing intelligence to improve threat response.\" style=\"object-fit:cover;\" srcset=\"https:\/\/swimlane.com\/wp-content\/uploads\/How-sharing-content-can-improve-threat-response.png 800w, https:\/\/swimlane.com\/wp-content\/uploads\/How-sharing-content-can-improve-threat-response-300x200.png 300w, https:\/\/swimlane.com\/wp-content\/uploads\/How-sharing-content-can-improve-threat-response-768x512.png 768w\" sizes=\"(max-width: 800px) 100vw, 800px\" \/><\/figure><\/div>\n\n\n\n<div class=\" bs-column col-sm-12  col-md-12 col-lg-6   bs-column-2ba18c9b6304620af4785b54fe900bf0ce0fc4d5 bs-column---default d-flex flex-column    \"><div class=\"wp-block-post-date\"><time datetime=\"2019-01-29T14:28:00-07:00\">1\uc6d4 29, 2019<\/time><\/div>\n\n<h1 class=\"wp-block-post-title has-text-color has-white-color\">How sharing content improves incident response<\/h1>\n\n\n<div class=\"bs-div bs-div-44a15e4b99450b7aaf810333a0fbaa4ff5112133 bs-div---default\"><div class=\"bs-div__inner d-flex flex-wrap align-items-center    \">\n<a class=\"bs-post__author has-text-align-center\" href=\"https:\/\/swimlane.com\/ko\/author\/Katie_Bykowski\/\">\n\t<div class=\"profile-desc\">\n\t\t<figure>\n\t\t\t<img decoding=\"async\" src=\"https:\/\/swimlane.com\/wp-content\/uploads\/author_Katie_Bykowski.jpg\" alt=\"user-avatar\">\n\t\t<\/figure>\n\t\t<span class=\"prefix\"><\/span>\n\t\t<span class=\"name\">\n\t\t\tKatie Bykowski\t\t<\/span>\n\t<\/div>\n<\/a>\n\n\n\n<div class=\"reading-time\">\n    <span class=\"reading-time__time\">3 <\/span> Minute Read\n<\/div><\/div><\/div>\n<\/div>\n<\/div>\n<\/div><\/section>\n\n\n\n\n\n\n\n\n\n<section class=\"bs-section bs-section-205a03f93391472c82564395e3b5684e68c8ef7d bs-section---default bs-section--blog-inner-main-contents  \"><div class=\"container\">\n<div class=\"bs-row row justify-content-between  bs-row---default\">\n<div class=\" bs-column col-sm-12 col-md-1   bs-column-fa02c15a19a9c2952663733986e45d4eef708638 bs-column---default     \"><div class=\"heateor_sss_sharing_container heateor_sss_horizontal_sharing\" data-heateor-ss-offset=\"0\" data-heateor-sss-href='https:\/\/swimlane.com\/ko\/blog\/sharing-content-improves-incident-response\/'><div class=\"heateor_sss_sharing_ul\"><a aria-label=\"Email\" class=\"heateor_sss_email\" href=\"https:\/\/swimlane.com\/ko\/blog\/sharing-content-improves-incident-response\/\" onclick=\"event.preventDefault();window.open('mailto:?subject=' + decodeURIComponent('How%20sharing%20content%20improves%20incident%20response').replace('&', '%26') + '&body=https%3A%2F%2Fswimlane.com%2Fko%2Fblog%2Fsharing-content-improves-incident-response%2F', '_blank')\" title=\"Email\" rel=\"noopener\" style=\"font-size:32px!important;box-shadow:none;display:inline-block;vertical-align:middle\"><span class=\"heateor_sss_svg\" style=\"background-color:#649a3f;width:35px;height:35px;border-radius:999px;display:inline-block;opacity:1;float:left;font-size:32px;box-shadow:none;display:inline-block;font-size:16px;padding:0 4px;vertical-align:middle;background-repeat:repeat;overflow:hidden;padding:0;cursor:pointer;box-sizing:content-box\"><svg style=\"display:block;border-radius:999px;\" focusable=\"false\" aria-hidden=\"true\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"100%\" height=\"100%\" viewBox=\"-.75 -.5 36 36\"><path d=\"M 5.5 11 h 23 v 1 l -11 6 l -11 -6 v -1 m 0 2 l 11 6 l 11 -6 v 11 h -22 v -11\" stroke-width=\"1\" fill=\"#fff\"><\/path><\/svg><\/span><\/a><a aria-label=\"Twitter\" class=\"heateor_sss_button_twitter\" href=\"https:\/\/twitter.com\/intent\/tweet?text=How%20sharing%20content%20improves%20incident%20response&url=https%3A%2F%2Fswimlane.com%2Fko%2Fblog%2Fsharing-content-improves-incident-response%2F\" title=\"Twitter\" rel=\"nofollow noopener\" target=\"_blank\" style=\"font-size:32px!important;box-shadow:none;display:inline-block;vertical-align:middle\"><span class=\"heateor_sss_svg heateor_sss_s__default heateor_sss_s_twitter\" style=\"background-color:#55acee;width:35px;height:35px;border-radius:999px;display:inline-block;opacity:1;float:left;font-size:32px;box-shadow:none;display:inline-block;font-size:16px;padding:0 4px;vertical-align:middle;background-repeat:repeat;overflow:hidden;padding:0;cursor:pointer;box-sizing:content-box\"><svg style=\"display:block;border-radius:999px;\" focusable=\"false\" aria-hidden=\"true\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"100%\" height=\"100%\" viewBox=\"-4 -4 39 39\"><path d=\"M28 8.557a9.913 9.913 0 0 1-2.828.775 4.93 4.93 0 0 0 2.166-2.725 9.738 9.738 0 0 1-3.13 1.194 4.92 4.92 0 0 0-3.593-1.55 4.924 4.924 0 0 0-4.794 6.049c-4.09-.21-7.72-2.17-10.15-5.15a4.942 4.942 0 0 0-.665 2.477c0 1.71.87 3.214 2.19 4.1a4.968 4.968 0 0 1-2.23-.616v.06c0 2.39 1.7 4.38 3.952 4.83-.414.115-.85.174-1.297.174-.318 0-.626-.03-.928-.086a4.935 4.935 0 0 0 4.6 3.42 9.893 9.893 0 0 1-6.114 2.107c-.398 0-.79-.023-1.175-.068a13.953 13.953 0 0 0 7.55 2.213c9.056 0 14.01-7.507 14.01-14.013 0-.213-.005-.426-.015-.637.96-.695 1.795-1.56 2.455-2.55z\" fill=\"#fff\"><\/path><\/svg><\/span><\/a><a aria-label=\"Facebook\" class=\"heateor_sss_facebook\" href=\"https:\/\/www.facebook.com\/sharer\/sharer.php?u=https%3A%2F%2Fswimlane.com%2Fko%2Fblog%2Fsharing-content-improves-incident-response%2F\" title=\"Facebook\" rel=\"nofollow noopener\" target=\"_blank\" style=\"font-size:32px!important;box-shadow:none;display:inline-block;vertical-align:middle\"><span class=\"heateor_sss_svg\" style=\"background-color:#0765FE;width:35px;height:35px;border-radius:999px;display:inline-block;opacity:1;float:left;font-size:32px;box-shadow:none;display:inline-block;font-size:16px;padding:0 4px;vertical-align:middle;background-repeat:repeat;overflow:hidden;padding:0;cursor:pointer;box-sizing:content-box\"><svg style=\"display:block;border-radius:999px;\" focusable=\"false\" aria-hidden=\"true\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"100%\" height=\"100%\" viewBox=\"0 0 32 32\"><path fill=\"#fff\" d=\"M28 16c0-6.627-5.373-12-12-12S4 9.373 4 16c0 5.628 3.875 10.35 9.101 11.647v-7.98h-2.474V16H13.1v-1.58c0-4.085 1.849-5.978 5.859-5.978.76 0 2.072.15 2.608.298v3.325c-.283-.03-.775-.045-1.386-.045-1.967 0-2.728.745-2.728 2.683V16h3.92l-.673 3.667h-3.247v8.245C23.395 27.195 28 22.135 28 16Z\"><\/path><\/svg><\/span><\/a><a aria-label=\"Linkedin\" class=\"heateor_sss_button_linkedin\" href=\"https:\/\/www.linkedin.com\/sharing\/share-offsite\/?url=https%3A%2F%2Fswimlane.com%2Fko%2Fblog%2Fsharing-content-improves-incident-response%2F\" title=\"Linkedin\" rel=\"nofollow noopener\" target=\"_blank\" style=\"font-size:32px!important;box-shadow:none;display:inline-block;vertical-align:middle\"><span class=\"heateor_sss_svg heateor_sss_s__default heateor_sss_s_linkedin\" style=\"background-color:#0077b5;width:35px;height:35px;border-radius:999px;display:inline-block;opacity:1;float:left;font-size:32px;box-shadow:none;display:inline-block;font-size:16px;padding:0 4px;vertical-align:middle;background-repeat:repeat;overflow:hidden;padding:0;cursor:pointer;box-sizing:content-box\"><svg style=\"display:block;border-radius:999px;\" focusable=\"false\" aria-hidden=\"true\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"100%\" height=\"100%\" viewBox=\"0 0 32 32\"><path d=\"M6.227 12.61h4.19v13.48h-4.19V12.61zm2.095-6.7a2.43 2.43 0 0 1 0 4.86c-1.344 0-2.428-1.09-2.428-2.43s1.084-2.43 2.428-2.43m4.72 6.7h4.02v1.84h.058c.56-1.058 1.927-2.176 3.965-2.176 4.238 0 5.02 2.792 5.02 6.42v7.395h-4.183v-6.56c0-1.564-.03-3.574-2.178-3.574-2.18 0-2.514 1.7-2.514 3.46v6.668h-4.187V12.61z\" fill=\"#fff\"><\/path><\/svg><\/span><\/a><\/div><div class=\"heateorSssClear\"><\/div><\/div>\n<\/div>\n\n\n\n<div class=\" bs-column col-sm-12  col-lg-8 col-md-11   bs-column-0d83d6d9863f92131cc95492d42e5b50c72f00bb bs-column---default bs-column--contents     \">\n<h2>\u00a0<\/h2>\n<p>Is your security team swamped by an unending deluge of alerts?<\/p>\n<span class='bctt-click-to-tweet'><span class='bctt-ctt-text'><a href='https:\/\/twitter.com\/intent\/tweet?url=https%3A%2F%2Fswimlane.com%2Fko%2Fblog%2Fsharing-content-improves-incident-response%2F&#038;text=79%25%20of%20security%20teams%20feel%20overwhelmed%20by%20the%20volume%20of%20threat%20alerts.&#038;related' target='_blank'rel=\"noopener noreferrer\">79% of security teams feel overwhelmed by the volume of threat alerts. <\/a><\/span><a href='https:\/\/twitter.com\/intent\/tweet?url=https%3A%2F%2Fswimlane.com%2Fko%2Fblog%2Fsharing-content-improves-incident-response%2F&#038;text=79%25%20of%20security%20teams%20feel%20overwhelmed%20by%20the%20volume%20of%20threat%20alerts.&#038;related' target='_blank' class='bctt-ctt-btn'rel=\"noopener noreferrer\">Share on X<\/a><\/span>\n<p>Too often, security operations (SecOps) teams are inundated with endless security alerts and are forced to respond with inefficient and time-consuming manual tasks. In fact, according to an analyst report by Enterprise Management Associates (EMA), \u201c79 percent of security teams\u201d feel \u201coverwhelmed by the volume of threat alerts.\u201d<\/p>\n<p>Far too many organizations are left with limited resources when it comes to implementing the incident response processes that best meet the specific requirements of their unique environments. Making matters worse, security teams often invest significant amounts of time and resources devising countermeasures to defend against specific threats only to have other teams (both inside and outside the organization) repeat that work to achieve the same security goal, wasting resources in the process.<\/p>\n<span class='bctt-click-to-tweet'><span class='bctt-ctt-text'><a href='https:\/\/twitter.com\/intent\/tweet?url=https%3A%2F%2Fswimlane.com%2Fko%2Fblog%2Fsharing-content-improves-incident-response%2F&#038;text=%23SecOps%20teams%20need%20to%20be%20prepared%20to%20collaborate%20with%20others%20to%20secure%20our%20collective%20digital%20future.%20%23SinkOrSwimlane&#038;related' target='_blank'rel=\"noopener noreferrer\">#SecOps teams need to be prepared to collaborate with others to secure our collective digital future. #SinkOrSwimlane <\/a><\/span><a href='https:\/\/twitter.com\/intent\/tweet?url=https%3A%2F%2Fswimlane.com%2Fko%2Fblog%2Fsharing-content-improves-incident-response%2F&#038;text=%23SecOps%20teams%20need%20to%20be%20prepared%20to%20collaborate%20with%20others%20to%20secure%20our%20collective%20digital%20future.%20%23SinkOrSwimlane&#038;related' target='_blank' class='bctt-ctt-btn'rel=\"noopener noreferrer\">Share on X<\/a><\/span>\n<p>Whether it involves monitoring the environment, informing the organization of attacks and vulnerabilities, or creating standards and protocols, organizations across the globe that face similar issues are feverishly building nearly identical responses to the same threats. SecOps teams need to be prepared to collaborate with other security teams to secure our collective digital future.<\/p>\n<h3>The need for collaboration<\/h3>\n<span class='bctt-click-to-tweet'><span class='bctt-ctt-text'><a href='https:\/\/twitter.com\/intent\/tweet?url=https%3A%2F%2Fswimlane.com%2Fko%2Fblog%2Fsharing-content-improves-incident-response%2F&#038;text=Effective%20incident%20response%20requires%20integrating%20a%20wide%20range%20of%20processes%2C%20people%20and%20technologies%20and%20likely%20involves%20orchestrating%20myriad%20tools.%20%23SOAR&#038;related' target='_blank'rel=\"noopener noreferrer\">Effective incident response requires integrating a wide range of processes, people and technologies and likely involves orchestrating myriad tools. #SOAR <\/a><\/span><a href='https:\/\/twitter.com\/intent\/tweet?url=https%3A%2F%2Fswimlane.com%2Fko%2Fblog%2Fsharing-content-improves-incident-response%2F&#038;text=Effective%20incident%20response%20requires%20integrating%20a%20wide%20range%20of%20processes%2C%20people%20and%20technologies%20and%20likely%20involves%20orchestrating%20myriad%20tools.%20%23SOAR&#038;related' target='_blank' class='bctt-ctt-btn'rel=\"noopener noreferrer\">Share on X<\/a><\/span>\n<p>Effective incident response requires integrating a wide range of processes, people and technologies and likely involves orchestrating myriad tools. To keep up with the dizzying pace of alarms, complex IT environments, unique internal requirements and a proliferating collection of security tools, SecOps teams often create a seemingly endless playbook of one-off processes and procedures. Because false positives and low-level attacks result in these time-consuming manual tasks and repetitive procedures, security teams often struggle to analyze and remediate novel threats in a timely manner.<\/p>\n<p>Unfortunately, security sharing is still limited because many organizations are reluctant to share information that they believe bad actors could use against them. Consequently, collaboration is often limited to the most high-level interactions (i.e., identifying and sharing the existence and basic characteristics of new threats). This needs to change.<\/p>\n<h3>Collaborate to improve incident response<\/h3>\n<span class='bctt-click-to-tweet'><span class='bctt-ctt-text'><a href='https:\/\/twitter.com\/intent\/tweet?url=https%3A%2F%2Fswimlane.com%2Fko%2Fblog%2Fsharing-content-improves-incident-response%2F&#038;text=As%20an%20industry%2C%20we%20need%20to%20move%20beyond%20the%20%27what%27%20of%20a%20threat%20and%20focus%20on%20the%20%27how%27%20to%20prevent%20it.%20%23SinkOrSwimlane&#038;related' target='_blank'rel=\"noopener noreferrer\">As an industry, we need to move beyond the &#039;what&#039; of a threat and focus on the &#039;how&#039; to prevent it. #SinkOrSwimlane <\/a><\/span><a href='https:\/\/twitter.com\/intent\/tweet?url=https%3A%2F%2Fswimlane.com%2Fko%2Fblog%2Fsharing-content-improves-incident-response%2F&#038;text=As%20an%20industry%2C%20we%20need%20to%20move%20beyond%20the%20%27what%27%20of%20a%20threat%20and%20focus%20on%20the%20%27how%27%20to%20prevent%20it.%20%23SinkOrSwimlane&#038;related' target='_blank' class='bctt-ctt-btn'rel=\"noopener noreferrer\">Share on X<\/a><\/span>\n<p>Threat intelligence is a broad category of information, and much of it can be shared to benefit the larger security community.<\/p>\n<p>Imagine doing an in-depth investigation, hunt or mitigation, and then being able to share that process in real time with another organization, allowing that organization to leverage their skills and expertise to increase the efficacy of your collective security operations centers (SOCs).<\/p>\n<p>While organizations are open and somewhat participatory in sharing some forms of security information, like indicators of compromise (IOCs)\u2014i.e., an IP address, file hash, email address, a domain or a URL\u2014this type of collaboration is focused on detection based on rudimentary, preventive capabilities. As an industry, we need to move beyond the <em>what <\/em>of a threat and focus on the <em>how <\/em>to prevent it from causing irreparable damage.<\/p>\n<p>As an example, incident response playbooks reveal <em>what<\/em> to do in order to respond to a threat effectively. They help security teams select the workflow that\u2019s best suited for a specific threat, but threat response data points can change rapidly. As a result, searching for <em>behaviors<\/em> instead of specific data points better equips organizations with information surrounding <em>how<\/em> to respond to and stop threats. Armed with the resources to prevent breaches and hunt for other threats while bolstering the security industry as a whole, collaboration is the future of security.<\/p>\n<p>As the threat landscape continues to grow and evolve, duplicating efforts will only get more expensive and exhausting. Cross-industry collaboration can help us level the playing field.<\/p>\n\n\n\n<div class=\"bs-div bs-div-4312ddfc9d16221ed0ed196f19c4182f102c76d9 bs-div---default bs-div--blog-inner-download-guide\"><style>.bs-div.bs-div-4312ddfc9d16221ed0ed196f19c4182f102c76d9 {background-image: url(https:\/\/swimlane.com\/wp-content\/uploads\/2022\/10\/download-report.png); background-position: center center;\n    background-size: cover;} <\/style><div class=\"bs-div__inner d-flex flex-wrap justify-content-center  flex-md-row-reverse align-items-md-center justify-content-md-between flex-md-nowrap  \"><div class='media-elements bs-media-element---default enable'>    <div class='bs-common-image'>\n                            <figure class='figure justify-content-start d-flex'>\n                            <picture>\n                            \n                            <img src='https:\/\/swimlane.com\/wp-content\/uploads\/Modular-Security-e-book-thumbnail.png' class='img-fluid'   alt='Swimlane whitepaper cover titled \u2018Modular Security in the Age of Automated SecOps' title=''  \/>\n                            <\/picture>\n                                \n                            <\/figure>\n                        <\/div><\/div>\n\n\n<div class=\"bs-div bs-div-773aef0a3852274bc6b23f7985e05efd194e399e bs-div---default\"><div class=\"bs-div__inner     \">\n<h2 class=\"wp-block-heading has-white-color has-text-color\" id=\"h-share-content-with-swimlane\">\u200bShare content with Swimlane<\/h2>\n\n\n\n<p class=\"has-white-color has-text-color\">At Swimlane, you&#8217;re not limited to a single playbook promising a &#8220;one size fits all&#8221; approach. We take the building blocks and elements of your security infrastructure that actually matter to <em>how<\/em> to respond and make them easy to share. Taking your security posture a step further, collaboration makes the collective\u2019s threat response capabilities stronger, faster and more effective, which, in turn, makes your life easier. <br>\nTo learn more about the shareable content that could free up your SecOps teams to do more thoughtful work, check out our e-book!<\/p>\n\n\n\n<span class=\"bs-pro-button bs-pro-button---default bs-pro-button--primary-with-arrow-small bs-pro-button-p-btn-fa5155b26ebd3b794b8d94f6037a870fde7fe712\"><style>.bs-pro-button-p-btn-fa5155b26ebd3b794b8d94f6037a870fde7fe712 .bs-pro-button__container {background-color: #abb8c3; color: #000000;}<\/style><a href=\"\" target=\"\" rel=\"noopener noreferrer\" class=\"bs-pro-button__container\">Read More<\/a><\/span>\n<\/div><\/div>\n<\/div><\/div>\n<\/div>\n\n\n\n<div class=\" bs-column col-sm-12  col-md-12 col-lg-3   bs-column-0ad64702520e52820989c3b8a4a5574abd826112 bs-column---default     \">\n<div class=\"bs-div bs-div-f0851be86a4542da358c10ec17ccebffa17efe07 bs-div---default bs-div--tags\"><div class=\"bs-div__inner     \">\n<h2 class=\"wp-block-heading\" id=\"h-tags\">Tags<\/h2>\n\n\n<div class=\"post-tag-wrapper\">\n    <p><a href='https:\/\/swimlane.com\/ko\/tag\/incident-response\/'><span class='tag-content'>Incident Response<\/span><\/a><\/p><\/div>\n<\/div><\/div>\n\n\n\n<div class=\"bs-div bs-div-5e7267355d8caf36f5b5e0c86eef387b664b848d bs-div---default bs-div--related-posts\"><div class=\"bs-div__inner     \">\n<h2 class=\"wp-block-heading\" id=\"h-related-posts\">Related Posts<\/h2>\n\n\n\n<div class=\"bs-related-posts bs-related-posts-block---default\"><div class=\"bs-related-posts__container\"><div class=\"bs-related-posts__items\">\n<div class=\" bs-column col-sm-4   bs-column-b619eb984092e720779a969a873521d2ec1a85a5 bs-column---default     \">\t\t\t\t\t<div class=\"bs-post bs-post-69e4d493d8d84 bs-single-post---default enable\" >\n\t\t\t<a class=\"bs-post__trigger\" href='https:\/\/swimlane.com\/ko\/blog\/a-day-in-the-life-with-content-marketing-manager-maycie-belmore\/' target='_self'>\t\t\t<div class=\"bs-post__inner\">\n\t\t\t\t<div class=\"bs-post__details\">    <div class=\"bs-post__date\">\n        <span>8\uc6d4 31, 2023<\/span>\n    <\/div>\n    <div class=\"bs-post__title\">\n        <h5>Life in the Swimlane with Content Marketing Manager, Maycie Belmore<\/h5>\n    <\/div>\n<div class=\"bs-post__learn-more\">\n    <span class='btn learn-more-text bs-post__learn-more-text'>Read More<\/span><\/div>\n<\/div>\t\t\t<\/div>\n\t\t\t<\/a>\t\t<\/div>\n\t<\/div>\n\n\n\n<div class=\" bs-column col-sm-4   bs-column-b619eb984092e720779a969a873521d2ec1a85a5 bs-column---default     \">\t\t\t\t\t<div class=\"bs-post bs-post-69e4d493da385 bs-single-post---default enable\" >\n\t\t\t<a class=\"bs-post__trigger\" href='https:\/\/swimlane.com\/ko\/blog\/incident-response-platform\/' target='_self'>\t\t\t<div class=\"bs-post__inner\">\n\t\t\t\t<div class=\"bs-post__details\">    <div class=\"bs-post__date\">\n        <span>9\uc6d4 2, 2022<\/span>\n    <\/div>\n    <div class=\"bs-post__title\">\n        <h5>Managing Security Alerts with an Incident Response Platform<\/h5>\n    <\/div>\n<div class=\"bs-post__learn-more\">\n    <span class='btn learn-more-text bs-post__learn-more-text'>Read More<\/span><\/div>\n<\/div>\t\t\t<\/div>\n\t\t\t<\/a>\t\t<\/div>\n\t<\/div>\n\n\n\n<div class=\" bs-column col-sm-4   bs-column-b619eb984092e720779a969a873521d2ec1a85a5 bs-column---default     \">\t\t\t\t\t<div class=\"bs-post bs-post-69e4d493db7df bs-single-post---default enable\" >\n\t\t\t<a class=\"bs-post__trigger\" href='https:\/\/swimlane.com\/ko\/blog\/nist-incident-response\/' target='_self'>\t\t\t<div class=\"bs-post__inner\">\n\t\t\t\t<div class=\"bs-post__details\">    <div class=\"bs-post__date\">\n        <span>1\uc6d4 31, 2018<\/span>\n    <\/div>\n    <div class=\"bs-post__title\">\n        <h5>Improving incident response with the NIST Cybersecurity Framework and security automation and orchestration (SAO)<\/h5>\n    <\/div>\n<div class=\"bs-post__learn-more\">\n    <span class='btn learn-more-text bs-post__learn-more-text'>Read More<\/span><\/div>\n<\/div>\t\t\t<\/div>\n\t\t\t<\/a>\t\t<\/div>\n\t<\/div>\n<\/div><\/div><\/div>\n<\/div><\/div>\n\n\n<\/div>\n<\/div>\n<\/div><\/section>\n\n\n\n<section class=\"bs-section bs-section-2a4a600ae9ab197b6a4ccafe05152bf1a2fde1d1 bs-section---default bs-section--newsletter bs-section--common-marketo-form bs-section--common-marketo-form-two-columns  \"><style>.bs-section.bs-section-2a4a600ae9ab197b6a4ccafe05152bf1a2fde1d1{ background-color: #000743;} <\/style><div class=\"container-fluid\">\n<div class=\"bs-row row   bs-row---default\">\n<div class=\" bs-column col-sm-0 col-md-0 col-lg-6   bs-column-df5e10bef85c15055718b4d93887855962017939 bs-column---default     \">\n<h2 class=\"wp-block-heading has-white-color has-text-color\" id=\"requestor\">Request a Live Demo<\/h2>\n<\/div>\n\n\n\n<div class=\" bs-column col-sm-0 col-md-0 col-lg-6   bs-column-df5e10bef85c15055718b4d93887855962017939 bs-column---default     \"><div class='media-elements bs-media-element---default enable'>    <div class='bs-common-image'>\n                            <figure class='figure justify-content-start d-flex'>\n                            <picture>\n                            \n                            <img src='https:\/\/swimlane.com\/wp-content\/uploads\/liitp.svg' class='img-fluid'   alt='' title=''  \/>\n                            <\/picture>\n                                \n                            <\/figure>\n                        <\/div><\/div>\n\n<script src=\"\/\/pages.swimlane.com\/js\/forms2\/js\/forms2.min.js\"><\/script>\n<form id=\"mktoForm_1017\"><\/form>\n<script>\n    var embeddedFormId = '05a6905d0187a23e165b2fd995e965fe15cb94f6';\n    var marketoBaseUrl = '\/\/pages.swimlane.com';\n    var munchkinId = '978-QCM-390';\n    var formId = '1017';\n    var responseType = 'redirect';\n    var responseMessage = 'Thank you!';\n    var redirectURL = '';\n    var downloadFileURL = '';\n    var linkOpenType = '_self';\n    var popupVideo = 'url';\n    var popupVideoURL = '';\n    var popupVideoUploadURL = '';\n    MktoForms2.loadForm(marketoBaseUrl, munchkinId, formId, function(form) {\n        form.onSuccess(function(values, followUpUrl) {\n            document.getElementById(\"int_mktoForm_\" + formId).innerHTML = responseMessage;\n                    });\n    });\n<\/script>\n<div class=\"form-submit-note\" id=\"int_mktoForm_1017\"><\/div>\n<!-- Incluing form response options -->\n\n\n\n<script>\n    (function() {\n        \/\/ Please include the email domains you would like to block in this list\n        var invalidDomains = [\"@gmail.\", \"@yahoo.\", \"@hotmail.\", \"@live.\", \"@icloud.\",\"@aol.\", \"@outlook.\", \"@proton.\", \"@mailinator.\"];\n\n\n        MktoForms2.whenReady(function(form) {\n            form.onValidate(function() {\n                var email = form.vals().Email;\n                if (email) {\n                    if (!isEmailGood(email)) {\n                        form.submitable(false);\n                        var emailElem = form.getFormElem().find(\"#Email\");\n                        form.showErrorMessage(\"Must be Business email.\", emailElem);\n                    } else {\n                        form.submitable(true);\n                    }\n                }\n            });\n        });\n\n        function isEmailGood(email) {\n            for (var i = 0; i < invalidDomains.length; i++) {\n                var domain = invalidDomains[i];\n                if (email.indexOf(domain) != -1) {\n                    return false;\n                }\n            }\n            return true;\n        }\n\n\n    })(); \n<\/script>\n<\/div>\n<\/div>\n<\/div><\/section>\n","protected":false},"excerpt":{"rendered":"","protected":false},"author":5,"featured_media":9766,"template":"","meta":{"_acf_changed":false,"show_custom_date":false,"custom_date":"","featured":false,"featured_image":0,"learn_more_label":"","image_alt_text":"","learn_more_type":"","learn_more_link":[],"show_popup":false,"disable_iframe":false,"enable_lazy_loading":false,"learn_more_link_file":0,"event_date":false,"event_start_date":"","event_end_date":"","featured_page_list":[],"_relevanssi_hide_post":"","_relevanssi_hide_content":"","_relevanssi_pin_for_all":"","_relevanssi_pin_keywords":"","_relevanssi_unpin_keywords":"","_relevanssi_related_keywords":"","_relevanssi_related_include_ids":"","_relevanssi_related_exclude_ids":"","_relevanssi_related_no_append":"","_relevanssi_related_not_related":"","_relevanssi_related_posts":"","_relevanssi_noindex_reason":"","inline_featured_image":false,"footnotes":""},"tags":[225],"resource-type":[67],"resource-topic":[],"resource-industry":[],"blog-category":[70],"class_list":["post-9765","sw_resource","type-sw_resource","status-publish","has-post-thumbnail","hentry","tag-incident-response","resource-type-blogs","blog-category-secops"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v22.5 (Yoast SEO v27.1.1) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>How sharing content greatly enhances incident response<\/title>\n<meta name=\"description\" content=\"How Sharing Content Improves Incident Response and drives efficacy across your security operations center freeing analysts&#039; time.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/swimlane.com\/ko\/\ube14\ub85c\uadf8\/\ucf58\ud150\uce20-\uacf5\uc720\ub294-\uc0ac\uac74-\ub300\uc751\uc744-\ud5a5\uc0c1\uc2dc\ud0b5\ub2c8\ub2e4\/\" \/>\n<meta property=\"og:locale\" content=\"ko_KR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"How sharing content improves incident response\" \/>\n<meta property=\"og:description\" content=\"How Sharing Content Improves Incident Response and drives efficacy across your security operations center freeing analysts&#039; time.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/swimlane.com\/ko\/\ube14\ub85c\uadf8\/\ucf58\ud150\uce20-\uacf5\uc720\ub294-\uc0ac\uac74-\ub300\uc751\uc744-\ud5a5\uc0c1\uc2dc\ud0b5\ub2c8\ub2e4\/\" \/>\n<meta property=\"og:site_name\" content=\"AI Security Automation\" \/>\n<meta property=\"article:modified_time\" content=\"2026-03-03T11:20:27+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/swimlane.com\/wp-content\/uploads\/How-sharing-content-can-improve-threat-response.png\" \/>\n\t<meta property=\"og:image:width\" content=\"800\" \/>\n\t<meta property=\"og:image:height\" content=\"533\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:site\" content=\"@swimlane\" \/>\n<meta name=\"twitter:label1\" content=\"\uc608\uc0c1 \ub418\ub294 \ud310\ub3c5 \uc2dc\uac04\" \/>\n\t<meta name=\"twitter:data1\" content=\"4\ubd84\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/swimlane.com\/ko\/blog\/sharing-content-improves-incident-response\/\",\"url\":\"https:\/\/swimlane.com\/ko\/blog\/sharing-content-improves-incident-response\/\",\"name\":\"How sharing content greatly enhances incident response\",\"isPartOf\":{\"@id\":\"https:\/\/swimlane.com\/ko\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/swimlane.com\/ko\/blog\/sharing-content-improves-incident-response\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/swimlane.com\/ko\/blog\/sharing-content-improves-incident-response\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/swimlane.com\/wp-content\/uploads\/How-sharing-content-can-improve-threat-response.png\",\"datePublished\":\"2019-01-29T21:28:00+00:00\",\"dateModified\":\"2026-03-03T11:20:27+00:00\",\"description\":\"How Sharing Content Improves Incident Response and drives efficacy across your security operations center freeing analysts' time.\",\"breadcrumb\":{\"@id\":\"https:\/\/swimlane.com\/ko\/blog\/sharing-content-improves-incident-response\/#breadcrumb\"},\"inLanguage\":\"ko-KR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/swimlane.com\/ko\/blog\/sharing-content-improves-incident-response\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"ko-KR\",\"@id\":\"https:\/\/swimlane.com\/ko\/blog\/sharing-content-improves-incident-response\/#primaryimage\",\"url\":\"https:\/\/swimlane.com\/wp-content\/uploads\/How-sharing-content-can-improve-threat-response.png\",\"contentUrl\":\"https:\/\/swimlane.com\/wp-content\/uploads\/How-sharing-content-can-improve-threat-response.png\",\"width\":800,\"height\":533,\"caption\":\"Thought leadership graphic on sharing intelligence to improve threat response.\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/swimlane.com\/ko\/blog\/sharing-content-improves-incident-response\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/swimlane.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"How sharing content improves incident response\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/swimlane.com\/ko\/#website\",\"url\":\"https:\/\/swimlane.com\/ko\/\",\"name\":\"Low-Code Security Automation & SOAR Platform | Swimlane\",\"description\":\"Agentic AI automation for every security function\",\"publisher\":{\"@id\":\"https:\/\/swimlane.com\/ko\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/swimlane.com\/ko\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"ko-KR\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/swimlane.com\/ko\/#organization\",\"name\":\"Low-Code Security Automation & SOAR Platform | Swimlane\",\"url\":\"https:\/\/swimlane.com\/ko\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"ko-KR\",\"@id\":\"https:\/\/swimlane.com\/ko\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/swimlane.com\/wp-content\/uploads\/sw-inline-logo-color-white.svg\",\"contentUrl\":\"https:\/\/swimlane.com\/wp-content\/uploads\/sw-inline-logo-color-white.svg\",\"width\":912,\"height\":190,\"caption\":\"Low-Code Security Automation & SOAR Platform | Swimlane\"},\"image\":{\"@id\":\"https:\/\/swimlane.com\/ko\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/x.com\/swimlane\",\"https:\/\/www.linkedin.com\/company\/swimlane\/\"]}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"\ucf58\ud150\uce20 \uacf5\uc720\uac00 \uc0ac\uace0 \ub300\uc751 \ub2a5\ub825\uc744 \ud06c\uac8c \ud5a5\uc0c1\uc2dc\ud0a4\ub294 \ubc29\ubc95","description":"\ucf58\ud150\uce20 \uacf5\uc720\ub97c \ud1b5\ud574 \uc0ac\uace0 \ub300\uc751\uc744 \uac1c\uc120\ud558\uace0 \ubcf4\uc548 \uc6b4\uc601 \uc13c\ud130 \uc804\ubc18\uc758 \ud6a8\uc728\uc131\uc744 \ub192\uc5ec \ubd84\uc11d\uac00\uc758 \uc2dc\uac04\uc744 \uc808\uc57d\ud558\ub294 \ubc29\ubc95.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/swimlane.com\/ko\/\ube14\ub85c\uadf8\/\ucf58\ud150\uce20-\uacf5\uc720\ub294-\uc0ac\uac74-\ub300\uc751\uc744-\ud5a5\uc0c1\uc2dc\ud0b5\ub2c8\ub2e4\/","og_locale":"ko_KR","og_type":"article","og_title":"How sharing content improves incident response","og_description":"How Sharing Content Improves Incident Response and drives efficacy across your security operations center freeing analysts' time.","og_url":"https:\/\/swimlane.com\/ko\/\ube14\ub85c\uadf8\/\ucf58\ud150\uce20-\uacf5\uc720\ub294-\uc0ac\uac74-\ub300\uc751\uc744-\ud5a5\uc0c1\uc2dc\ud0b5\ub2c8\ub2e4\/","og_site_name":"AI Security Automation","article_modified_time":"2026-03-03T11:20:27+00:00","og_image":[{"width":800,"height":533,"url":"https:\/\/swimlane.com\/wp-content\/uploads\/How-sharing-content-can-improve-threat-response.png","type":"image\/png"}],"twitter_card":"summary_large_image","twitter_site":"@swimlane","twitter_misc":{"\uc608\uc0c1 \ub418\ub294 \ud310\ub3c5 \uc2dc\uac04":"4\ubd84"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/swimlane.com\/ko\/blog\/sharing-content-improves-incident-response\/","url":"https:\/\/swimlane.com\/ko\/blog\/sharing-content-improves-incident-response\/","name":"\ucf58\ud150\uce20 \uacf5\uc720\uac00 \uc0ac\uace0 \ub300\uc751 \ub2a5\ub825\uc744 \ud06c\uac8c \ud5a5\uc0c1\uc2dc\ud0a4\ub294 \ubc29\ubc95","isPartOf":{"@id":"https:\/\/swimlane.com\/ko\/#website"},"primaryImageOfPage":{"@id":"https:\/\/swimlane.com\/ko\/blog\/sharing-content-improves-incident-response\/#primaryimage"},"image":{"@id":"https:\/\/swimlane.com\/ko\/blog\/sharing-content-improves-incident-response\/#primaryimage"},"thumbnailUrl":"https:\/\/swimlane.com\/wp-content\/uploads\/How-sharing-content-can-improve-threat-response.png","datePublished":"2019-01-29T21:28:00+00:00","dateModified":"2026-03-03T11:20:27+00:00","description":"\ucf58\ud150\uce20 \uacf5\uc720\ub97c \ud1b5\ud574 \uc0ac\uace0 \ub300\uc751\uc744 \uac1c\uc120\ud558\uace0 \ubcf4\uc548 \uc6b4\uc601 \uc13c\ud130 \uc804\ubc18\uc758 \ud6a8\uc728\uc131\uc744 \ub192\uc5ec \ubd84\uc11d\uac00\uc758 \uc2dc\uac04\uc744 \uc808\uc57d\ud558\ub294 \ubc29\ubc95.","breadcrumb":{"@id":"https:\/\/swimlane.com\/ko\/blog\/sharing-content-improves-incident-response\/#breadcrumb"},"inLanguage":"ko-KR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/swimlane.com\/ko\/blog\/sharing-content-improves-incident-response\/"]}]},{"@type":"ImageObject","inLanguage":"ko-KR","@id":"https:\/\/swimlane.com\/ko\/blog\/sharing-content-improves-incident-response\/#primaryimage","url":"https:\/\/swimlane.com\/wp-content\/uploads\/How-sharing-content-can-improve-threat-response.png","contentUrl":"https:\/\/swimlane.com\/wp-content\/uploads\/How-sharing-content-can-improve-threat-response.png","width":800,"height":533,"caption":"Thought leadership graphic on sharing intelligence to improve threat response."},{"@type":"BreadcrumbList","@id":"https:\/\/swimlane.com\/ko\/blog\/sharing-content-improves-incident-response\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/swimlane.com\/"},{"@type":"ListItem","position":2,"name":"How sharing content improves incident response"}]},{"@type":"WebSite","@id":"https:\/\/swimlane.com\/ko\/#website","url":"https:\/\/swimlane.com\/ko\/","name":"\ub85c\uc6b0\ucf54\ub4dc \ubcf4\uc548 \uc790\ub3d9\ud654 \ubc0f SOAR \ud50c\ub7ab\ud3fc | \uc2a4\uc714\ub808\uc778","description":"\ubaa8\ub4e0 \ubcf4\uc548 \uae30\ub2a5\uc744 \uc704\ud55c \uc5d0\uc774\uc804\ud2b8 \uae30\ubc18 AI \uc790\ub3d9\ud654","publisher":{"@id":"https:\/\/swimlane.com\/ko\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/swimlane.com\/ko\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"ko-KR"},{"@type":"Organization","@id":"https:\/\/swimlane.com\/ko\/#organization","name":"\ub85c\uc6b0\ucf54\ub4dc \ubcf4\uc548 \uc790\ub3d9\ud654 \ubc0f SOAR \ud50c\ub7ab\ud3fc | \uc2a4\uc714\ub808\uc778","url":"https:\/\/swimlane.com\/ko\/","logo":{"@type":"ImageObject","inLanguage":"ko-KR","@id":"https:\/\/swimlane.com\/ko\/#\/schema\/logo\/image\/","url":"https:\/\/swimlane.com\/wp-content\/uploads\/sw-inline-logo-color-white.svg","contentUrl":"https:\/\/swimlane.com\/wp-content\/uploads\/sw-inline-logo-color-white.svg","width":912,"height":190,"caption":"Low-Code Security Automation & SOAR Platform | Swimlane"},"image":{"@id":"https:\/\/swimlane.com\/ko\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/swimlane","https:\/\/www.linkedin.com\/company\/swimlane\/"]}]}},"publishpress_future_workflow_manual_trigger":{"enabledWorkflows":[]},"_links":{"self":[{"href":"https:\/\/swimlane.com\/ko\/wp-json\/wp\/v2\/sw_resource\/9765","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/swimlane.com\/ko\/wp-json\/wp\/v2\/sw_resource"}],"about":[{"href":"https:\/\/swimlane.com\/ko\/wp-json\/wp\/v2\/types\/sw_resource"}],"author":[{"embeddable":true,"href":"https:\/\/swimlane.com\/ko\/wp-json\/wp\/v2\/users\/5"}],"version-history":[{"count":2,"href":"https:\/\/swimlane.com\/ko\/wp-json\/wp\/v2\/sw_resource\/9765\/revisions"}],"predecessor-version":[{"id":54418,"href":"https:\/\/swimlane.com\/ko\/wp-json\/wp\/v2\/sw_resource\/9765\/revisions\/54418"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/swimlane.com\/ko\/wp-json\/wp\/v2\/media\/9766"}],"wp:attachment":[{"href":"https:\/\/swimlane.com\/ko\/wp-json\/wp\/v2\/media?parent=9765"}],"wp:term":[{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/swimlane.com\/ko\/wp-json\/wp\/v2\/tags?post=9765"},{"taxonomy":"resource-type","embeddable":true,"href":"https:\/\/swimlane.com\/ko\/wp-json\/wp\/v2\/resource-type?post=9765"},{"taxonomy":"resource-topic","embeddable":true,"href":"https:\/\/swimlane.com\/ko\/wp-json\/wp\/v2\/resource-topic?post=9765"},{"taxonomy":"resource-industry","embeddable":true,"href":"https:\/\/swimlane.com\/ko\/wp-json\/wp\/v2\/resource-industry?post=9765"},{"taxonomy":"blog-category","embeddable":true,"href":"https:\/\/swimlane.com\/ko\/wp-json\/wp\/v2\/blog-category?post=9765"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}