Close
  • Latest News
  • Big Data and Analytics
  • Cloud
  • Networking
  • Cybersecurity
  • Applications
  • IT Management
  • Storage
  • Sponsored
  • Mobile
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
Read Down
Sign in
Close
Welcome!Log into your account
Forgot your password?
Read Down
Password recovery
Recover your password
Close
Search
Logo
Logo
  • Latest News
  • Big Data and Analytics
  • Cloud
  • Networking
  • Cybersecurity
  • Applications
  • IT Management
  • Storage
  • Sponsored
  • Mobile
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
More
    Home Latest News
    • Small Business

    Businesses Remain Challenged by Collection, Analysis of Threat Data

    By
    Nathan Eddy
    -
    May 20, 2015
    Share
    Facebook
    Twitter
    Linkedin
      esg and data analysis

      Most organizations overwhelmingly value threat intelligence sharing, but are having difficulty dealing with the sheer volume of data that needs to be analyzed, according to Enterprise Strategy Group’s (ESG) Threat Intelligence Survey of 304 IT professionals.

      The study found that 94 percent of respondents overwhelmingly believe it is highly or somewhat valuable to share threat intelligence information between federal agencies and other private organizations.

      Nearly all participants (97 percent) said that standards are very important or somewhat important for their organizations to consume threat intelligence.

      “I was surprised that so many organizations have threat intelligence programs and that they are investing lots of money into their success,” Jon Oltsik, ‎senior principal analyst at ESG, told eWEEK. “I was also surprised how willingly many organizations share their own threat intelligence. Clearly, CISOs are realizing the importance and benefits associated with threat intelligence today and are placing bets for the future.”

      However, only 37 percent of respondents’ organizations regularly share internally- driven threat intelligence with other organizations or industry information sharing and analysis centers (ISACs).

      Nearly three-quarters (72 percent) of participants responded that spending on their organization’s threat intelligence program will increase significantly or somewhat in the next 12 to 18 months.

      Oltsik noted there are several challenges businesses face when trying to deploy a threat intelligence strategy.

      “First, lots of threat intelligence collection and analysis is performed as a manual process today. Threat indicators literally come in as email text, and this text has to be manually input into another system,” he said. “Second, many firms lack any type of threat intelligence analytics system, so they build their own or rely on open source tools. Third, aside from big financial services firms and defense contractors, there are not a lot of threat intelligence skills out there so many organizations are relying on on-the-job training.”

      According to the survey, some of the top challenges to collecting and analyzing external threat intelligence include difficulty getting a holistic picture of internal and external threats (32 percent), and inadvertently blocking legitimate traffic as a result of a problem with threat intelligence collection or analysis (32 percent).

      Other issues include threat intelligence collection and analysis workflow process and integration problems (31 percent), and threat intelligence not being always as timely or actionable as it is needed to be (28 percent).

      In addition, just under three-quarters (72 percent) of organizations plan to collect and analyze significantly more or somewhat more internal threat intelligence over the next 12 to 24 months, while 55 percent of organizations plan to collect and analyze significantly more or somewhat more external threat intelligence over the next 12 to 24 months.

      “Organizations need to operationalize threat intelligence programs, which means they need training and infrastructure, and these will require time and money,” Oltsik said. “They will have to learn about threat intelligence standards and incorporate them into their internal systems. They will have to learn what information they want to redact when they share threat intelligence and they’ll need a process to do this. Finally, they will need to integrate threat intelligence into their security and IT infrastructure to automate remediation tasks.”

      Nathan Eddy
      A graduate of Northwestern University's Medill School of Journalism, Nathan was perviously the editor of gaming industry newsletter FierceGameBiz and has written for various consumer and tech publications including Popular Mechanics, Popular Science, CRN, and The Times of London. Currently based in Berlin, he released his first documentary film, The Absent Column, in 2013.

      MOST POPULAR ARTICLES

      Cybersecurity

      Visa’s Michael Jabbara on Cybersecurity and Digital...

      James Maguire - May 17, 2022 0
      I spoke with Michael Jabbara, VP and Global Head of Fraud Services at Visa, about the cybersecurity technology used to ensure the safe transfer...
      Read more
      Android

      Samsung Galaxy XCover Pro: Durability for Tough...

      Chris Preimesberger - December 5, 2020 0
      Have you ever dropped your phone, winced and felt the pain as it hit the sidewalk? Either the screen splintered like a windshield being...
      Read more
      Cloud

      Yotascale CEO Asim Razzaq on Controlling Multicloud...

      James Maguire - May 5, 2022 0
      Asim Razzaq, CEO of Yotascale, provides guidance on understanding—and containing—the complex cost structure of multicloud computing. Among the topics we covered:  As you survey the...
      Read more
      Big Data and Analytics

      GoodData CEO Roman Stanek on Business Intelligence...

      James Maguire - May 4, 2022 0
      I spoke with Roman Stanek, CEO of GoodData, about business intelligence, data as a service, and the frustration that many executives have with data...
      Read more
      IT Management

      Intuit’s Nhung Ho on AI for the...

      James Maguire - May 13, 2022 0
      I spoke with Nhung Ho, Vice President of AI at Intuit, about adoption of AI in the small and medium-sized business market, and how...
      Read more
      Logo

      eWeek has the latest technology news and analysis, buying guides, and product reviews for IT professionals and technology buyers. The site’s focus is on innovative solutions and covering in-depth technical content. eWeek stays on the cutting edge of technology news and IT trends through interviews and expert analysis. Gain insight from top innovators and thought leaders in the fields of IT, business, enterprise software, startups, and more.

      Facebook
      Linkedin
      RSS
      Twitter
      Youtube

      Advertisers

      Advertise with TechnologyAdvice on eWeek and our other IT-focused platforms.

      Advertise with Us

      Menu

      • About eWeek
      • Subscribe to our Newsletter
      • Latest News

      Our Brands

      • Privacy Policy
      • Terms
      • About
      • Contact
      • Advertise
      • Sitemap
      • California – Do Not Sell My Information

      Property of TechnologyAdvice.
      © 2021 TechnologyAdvice. All Rights Reserved

      Advertiser Disclosure: Some of the products that appear on this site are from companies from which TechnologyAdvice receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. TechnologyAdvice does not include all companies or all types of products available in the marketplace.

      ×