Close
  • Latest News
  • Artificial Intelligence
  • Video
  • Big Data and Analytics
  • Cloud
  • Networking
  • Cybersecurity
  • Applications
  • IT Management
  • Storage
  • Sponsored
  • Mobile
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
Read Down
Sign in
Close
Welcome!Log into your account
Forgot your password?
Read Down
Password recovery
Recover your password
Close
Search
Logo
Subscribe
Logo
  • Latest News
  • Artificial Intelligence
  • Video
  • Big Data and Analytics
  • Cloud
  • Networking
  • Cybersecurity
  • Applications
  • IT Management
  • Storage
  • Sponsored
  • Mobile
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
More
    Subscribe
    Home Cybersecurity
    • Cybersecurity

    9 Ways for an Enterprise to Improve Its Threat Intelligence Strategy

    By
    Chris Preimesberger
    -
    February 22, 2016
    Share
    Facebook
    Twitter
    Linkedin

      eWEEK content and product recommendations are editorially independent. We may make money when you click on links to our partners. Learn More.

      PrevNext

      19 Ways for an Enterprise to Improve Its Threat Intelligence Strategy

      1 - 9 Ways for an Enterprise to Improve Its Threat Intelligence Strategy

      Keeping an eye on the big picture, reducing operational threats and maintaining profitability should be fundamental to a company’s threat intelligence strategies.

      2Go Beyond Passive Intelligence Gathering

      2 - Go Beyond Passive Intelligence Gathering

      There are three primary means of gathering cyber-threat intelligence: 1) signals intelligence (SIGINT) results from intercepting and analyzing signals, usually those used for communications; 2) open-source intelligence (OSINT) comes from publicly available information; for our purposes, it’s intelligence sourced from the Internet, whether through search engines or focused crawling software; 3) human intelligence (HUMINT) includes human sources within threat-actor communities. Establish priorities befitting your organization.

      3To Build or Not to Build: Bite the Bullet and Choose

      3 - To Build or Not to Build: Bite the Bullet and Choose

      The thing about threat intelligence is that you never seem to have enough. Most companies start out small, and the more they look, the more they find. After a while the job gets too big, and something has to be done. Then comes that age-old question: Build or buy? Get advice from specialists that fit your use case before going it alone.

      4Get Better Context

      4 - Get Better Context

      It’s tempting to focus exclusively on the latest threats and pore over the last week’s incoming signals data trying to identify nefarious micro trends. But if you get lost in the minutiae, you risk falling prey to other, more enduring threats. Basically, your threat intelligence must cover both macro and micro time periods in order to minimize the risk of suffering a serious breach.

      5It’s Not What You Know, It’s What You Do With It

      5 - It's Not What You Know, It's What You Do With It

      One of the most common issues with threat intelligence is not the collection or processing of intelligence. It’s the communication of intelligence between different areas of the organization. Red teams, security operations centers (SOCs), incident response (IR), vulnerability management— these are all areas that can benefit dramatically from high-quality threat intelligence. If the only thing you do after reading this is to investigate the way intelligence is disseminated within your organization, it will have been worth your time.

      6Breach the Knowledge Gap

      6 - Breach the Knowledge Gap

      When it comes to threat intelligence, there is a wide (and widely publicized) knowledge gap, and it’s roughly the size and shape of the average C-suite. This will need to change. However, keep in mind that the knowledge gap isn’t necessarily the fault of C-suite members; it’s the fault of cyber-specialists who lack the ability to translate these very real cyber-threats into language that leaders can understand and act upon. So make it a point to engage with them as often as possible—in person and through channels. Ask them what they need and how they need it. They need useful information in a format they can digest and understand easily.

      7Operational vs. Strategic

      7 - Operational vs. Strategic

      A useful TI program automates the processing of external attack data (also known as indicators of compromise, or IOC) from all available sources. Automating incident identification is Phase One. Phase Two is automating new defensive controls (generally rules) to prevent future incidents. This core TI function is operational because it revolves around computational resources. Building on operational capabilities, a world-class TI program consists of strategic analysis centered around talented human resources. Analysts identify current and future information security threats to the business’ strategic assets.

      8Trend Identification

      8 - Trend Identification

      Trend identification may include macro projects, such as determining next year’s top cyber-threats to the enterprise. Macro trends are generally viewed through quarterly or annual lenses; micro trends include identifying the release of new tools likely to be leveraged by adversaries. Micro trends tend to be daily or weekly in nature.

      9Internal Hunting

      9 - Internal Hunting

      Monitoring for rogue insider activity and/or undetected external attacks is another strategic function that TI should regularly be performing. Knowledge of the network topology and available telemetry sources is a prerequisite, but great hunters are creative and able to produce new hunting methodologies based on pattern and anomaly recognition in single and combined data sets.

      10Just Keep Asking Yourself One Question

      10 - Just Keep Asking Yourself One Question

      When it comes down to it, threat intelligence is as complicated as you want it to be. There’s always something else to test, more logs to check and new research to pore over. But while you’re doing that, you should keep asking yourself the same question: Will this help the organization stay profitable? And any time the answer is no, put it down and move on. After all, there’s plenty more where that came from.

      PrevNext

      Get the Free Newsletter!

      Subscribe to Daily Tech Insider for top news, trends & analysis

      MOST POPULAR ARTICLES

      Artificial Intelligence

      9 Best AI 3D Generators You Need...

      Sam Rinko - June 25, 2024 0
      AI 3D Generators are powerful tools for many different industries. Discover the best AI 3D Generators, and learn which is best for your specific use case.
      Read more
      Cloud

      RingCentral Expands Its Collaboration Platform

      Zeus Kerravala - November 22, 2023 0
      RingCentral adds AI-enabled contact center and hybrid event products to its suite of collaboration services.
      Read more
      Artificial Intelligence

      8 Best AI Data Analytics Software &...

      Aminu Abdullahi - January 18, 2024 0
      Learn the top AI data analytics software to use. Compare AI data analytics solutions & features to make the best choice for your business.
      Read more
      Latest News

      Zeus Kerravala on Networking: Multicloud, 5G, and...

      James Maguire - December 16, 2022 0
      I spoke with Zeus Kerravala, industry analyst at ZK Research, about the rapid changes in enterprise networking, as tech advances and digital transformation prompt...
      Read more
      Video

      Datadog President Amit Agarwal on Trends in...

      James Maguire - November 11, 2022 0
      I spoke with Amit Agarwal, President of Datadog, about infrastructure observability, from current trends to key challenges to the future of this rapidly growing...
      Read more
      Logo

      eWeek has the latest technology news and analysis, buying guides, and product reviews for IT professionals and technology buyers. The site’s focus is on innovative solutions and covering in-depth technical content. eWeek stays on the cutting edge of technology news and IT trends through interviews and expert analysis. Gain insight from top innovators and thought leaders in the fields of IT, business, enterprise software, startups, and more.

      Facebook
      Linkedin
      RSS
      Twitter
      Youtube

      Advertisers

      Advertise with TechnologyAdvice on eWeek and our other IT-focused platforms.

      Advertise with Us

      Menu

      • About eWeek
      • Subscribe to our Newsletter
      • Latest News

      Our Brands

      • Privacy Policy
      • Terms
      • About
      • Contact
      • Advertise
      • Sitemap
      • California – Do Not Sell My Information

      Property of TechnologyAdvice.
      © 2024 TechnologyAdvice. All Rights Reserved

      Advertiser Disclosure: Some of the products that appear on this site are from companies from which TechnologyAdvice receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. TechnologyAdvice does not include all companies or all types of products available in the marketplace.