[3] This project started around June 2011 when Christophe Vandeplas had a frustration that way too many Indicators of Compromise (IOCs) were shared by email, or in pdf documents and were not parsable by automatic machines.
[4] One thing led to another and some months later NATO hired a full-time developer to improve the code and add more features.
[4] In January 2013 Andras Iklody became the main full-time developer of MISP, during the day initially hired by NATO and during the evening and week-end contributor to an open source project.
[4] The project is funded by the European Union (through the Connecting Europe Facility[5]) and the Computer Incident Response Center Luxembourg.
Commercial sources with integration to MISP include Symantec's DeepSight Intelligence (now called Broadcom), Kaspersky threat feeds and McAfee Active Response.