Information exchange about security vulnerabilities and threats is crucial to the success of security responses. Effective and timely distribution can only flourish in an environment of trust. This requires a consistent policy framework and language, but also an understanding of what can be done by whom using shared data. Sending,…