The current threat landscape is made of highly complex viruses and/or stealth intrusions, very difficult to prevent, identify, detect, etc. Also the IT environment is vast, heterogeneous, not always managed, making it even more difficult to ensure that a breach is contained quickly and in effective manner. So what do we need? An easy and standard way to describe a breach or the describe a malware and its behaviors. Also we need the ability to share this description You guess it, Indicators of Compromise are the solution!