With the vigorous development of big data and Internet of Things, and the popularity of information technology applications such as mobile devices and cloud services, these emerging products of communication technology not only make information transmission more rapid, but also make our lives more convenient. Therefore, in order to cope with the development of science and technology of growing information security threats, understanding how hackers attack is one of the necessary conditions for organizations to secure their information systems. For the ever-changing security threats and quickly grasp the security information to reduce the impact of security vulnerabilities, this paper will by external intelligence resources and SP-ISAC threat intelligence resources database cross-check, release information security early warning notification of the relevant SP-ISAC members via the comparison results, and to assist Members to cope, to master the information security threat status, reduce the damage caused by information security incidents may achieve defense in depth effect.