APAC CIO Outlook
  • Home
  • CXO Insights
  • CIO Views
  • Vendors
  • News
  • Conferences
  • Whitepapers
  • Newsletter
  • About us
  • Awards
Apac
  • Agile

    AI Healthcare

    Artificial Intelligence

    Aviation

    Big Data

    Cloud

    Cyber Security

    Digital Infrastructure

    Digital Marketing

    Digital Transformation

    Digital Twin

    Drone

    Internet of Things

    Low Code No Code

    Networking

    Remote Work

    Startup

    Unified Communication

    Wireless

  • Bi and Analytics

    E-Commerce

    Education

    FinTech

    Healthcare

    Manufacturing

    Pharma and Life Science

    Retail

    Travel and Hospitality

  • Dell

    IBM

    Microsoft

    Salesforce

    SAP

  • Cognitive

    Compliance

    Contact Center

    Corporate Finance

    Data Center

    Data Integration

    Digital Asset Management

    Full Stack Development

    HR Technology

    IT Service Management

    Managed Services

    Procurement

    Proptech

    RegTech

Menu
    • Gamification
    • IBM
    • Aviation
    • Data Center
    • Digital Infrastructure
    • Unified Communication
    • Retail
    • Salesforce
    • MORE
    #

    Apac CIO Outlook Weekly Brief

    ×

    Be first to read the latest tech news, Industry Leader's Insights, and CIO interviews of medium and large enterprises exclusively from Apac CIO Outlook

    Subscribe

    loading

    THANK YOU FOR SUBSCRIBING

    • Home
    • Gamification
    Editor's Pick (1 - 4 of 8)
    left
    Accelerating Digitization Process with Gamification

    Rahul Shinde, CIO and Director Digital Transformation, Duy Tan Plastics Corporation

    Charting A Digital Transformation: Are You Ready?

    Faisal Parvez, Director, IT & CIO Business Partner, Asia Pacific, Middle East & Africa, BT Global Services

    Today's CIO: Survival vs Evolution

    Sundi Balu, CIO, Telstra

    Mastering Technology Selection for Competitive Advantage

    Rob Meilen, VP & CIO, Hunter Douglas

    Smart Use of Current Technology Is Required To Make Gains

    Daniel Lebeau, CIO, GlaxoSmithKline

    The Key to Delivering Real-time Streaming to Global Audiences

    Jaheer Abbas, Senior Director, Sea & India, Limelight Networks

    Games in Apps that can Change our Lives

    Jasmine Phua, Director, Operation Process, Gumi Asia Pte Ltd

    The Bank of the Future is Platform-Based

    Dr. Sebastian Wedeniwski, Chief Technology Strategist, Standard Chartered Bank

    right

    The Great Threat Intelligence Debate

    Dan Holden, Director-Security Research, Arbor Networks

    Tweet
    content-image

    Dan Holden, Director-Security Research, Arbor Networks

    Input “threat intelligence” into your Google News search engine and over 1.3 million results pop up. It’s become the latest in popular buzzwords in the Internet security industry. But, besides the obvious reasons, why is the industry so hot to trot on the notion of threat intelligence/sharing at the moment?

    Before I address the ‘why’ question, I should take a step back to address the ‘what’ question: what is good cyber threat intelligence, anyway?

    Advanced technologies may be able to detect the vast amount, size and scope of cyber threats out there, issuing alerts when a system is compromised, but without context or relevant information about the attack, security analysts may inadvertently dismiss serious attacks as unimportant noise. Actionable, defensible security intelligence is required to quickly identify threats that are targeting—and have already compromised—your environment.

    The right security intelligence fuels the creation of mechanisms to recognize and block network-based attacks— some of the time. However, effective security intelligence not only identifies attacks, methods, and other indicators, but also understands and catalogs the attack infrastructure, so that broader, more proactive measures can be taken with confidence.

    The main goal for threat intelligence and threat sharing is to get at that much-needed greater context into the events happening on your network or your ‘piece’ of the Internet and how it interacts with the rest of the Internet. It can also make up for the lack of greater context into simple events logged in legacy technologies (firewalls, IDS, anti-virus.) Getting at the why, where, and how of a security event versus just knowing that the event or the indicator of compromise exists.

    The problem with threat intelligence is that it’s become a bit of a big data headache. For effective threat intelligence, you need a giant store of the known ‘bad’— something that changes a million times a day—and the majority of the known bad, you might never interact with at all. It may never apply to your particular slice of the Internet. The efficiencies and costs associated with storing that amount of data isn’t very appealing to most, despite the upside to having your hands on what could be some really great insight into the threats your network is or could be exposed to. This is why many vendors are partnering up to create these shared threat intelligence groups—taking the big data burden off of one and spreading it among many, but in a trusted, smaller-scale, but still effective, environment.

    Given the influx of threats coming at you from every possible angle, entry-point and vector, what is really needed to stay ahead of attackers? Context. That context can help you gauge risk, prioritize your security responder’s time, and move on to the next threat (among many) at hand. In other words, don’t focus on threat intelligence merely for its sake—or because it's the latest hot buzzword in the industry. Threat intelligence data not only needs to be actionable and proven, it also needs to be easily accessible for incident responders to be efficient and effective.

    The goal of threat intelligence shouldn’t be corroborating bad data with more questionable data (because threat intelligence isn’t always proven), but it should be about searching out the best data that fits the risk profile of your particular organization, industry, and risk. At the end of the day, threat intelligence is about tracking the threat actors; naturally everyone will have a different slant or specialty on this. Ultimately, threat intelligence should make a marked improvement over existing staff and processes. If you have a giant library and no time to read anything in that library, then all you have is a bunch of books. No action, no intelligence.

    tag

    Big Data

    Cyber Threats

    Weekly Brief

    loading
    Top 10 Gamification Technology Solution Companies - 2019
    Top 10 Gamification Technology Consulting/Services Companies - 2019
    ON THE DECK

    Gamification 2019

    Top Vendors

    Gamification 2017

    Top Vendors

    Previous Next

    I agree We use cookies on this website to enhance your user experience. By clicking any link on this page you are giving your consent for us to set cookies. More info

    Read Also

    ESG Performance - Why It's Crucial To Future Success

    ESG Performance - Why It's Crucial To Future Success

    Jo-Anne Ruhl, vice president and managing director, Workday Australia and New Zealand.
    Digital Acclerating Duke Energy's Transformation

    Digital Acclerating Duke Energy's Transformation

    Brian Savoy, Senior Vice President, Chief Transformation and Administrative Officer, Duke Energy Corporation
    Fear the cloud, or not, better yet don't fear...

    Fear the cloud, or not, better yet don't fear...

    Timothy Masey, VP, IT Infrastructure & Security Carhartt
    Beautifully Autistic - Enabled To Make A Difference What Did My Children Teach Me About Life, Business, And Innovation?

    Beautifully Autistic - Enabled To Make A Difference What Did My Children Teach Me About Life, Business, And Innovation?

    Ahmed Abukhater, CIO - Chief Innovation Office Boeing
    Enhancing POS Experience for Employee and Customer is the Key to Success

    Enhancing POS Experience for Employee and Customer is the Key to Success

    Christopher Davis, Chief Information Officer, the Tile Shop
    The Possibility of Scan-and-Go Pos Solutions

    The Possibility of Scan-and-Go Pos Solutions

    Rebecca Meyer, Director of it - Commerce Applications and Ecommerce, Kelly-Moore Paints
    Critical Elements of a Data Driven Product Organization in E-Commerce

    Critical Elements of a Data Driven Product Organization in E-Commerce

    Ankit Mangal, Director, Advanced Analytics and Insights, Wayfair
    The Intersection of Technology andTransportation: How an eCommerce Book Seller Became a Leader in Logistics

    The Intersection of Technology andTransportation: How an eCommerce Book Seller Became a Leader in Logistics

    Dave Bozeman, Vice President, Amazon Transportation Services
    Loading...

    Copyright © 2022 APAC CIOoutlook. All rights reserved. Registration on or use of this site constitutes acceptance of our Terms of Use and Privacy and Anti Spam Policy 

    |  Sitemap |  Subscribe

    follow on linkedinfollow on twitter follow on rss
    This content is copyright protected

    However, if you would like to share the information in this article, you may use the link below:

    https://gamification.apacciooutlook.com/cxoinsights/the-great-threat-intelligence-debate-nwid-276.html