APAC CIOOutlook

Advertise

with us

  • Technologies
      • Artificial Intelligence
      • Big Data
      • Blockchain
      • Cloud
      • Digital Transformation
      • Internet of Things
      • Low Code No Code
      • MarTech
      • Mobile Application
      • Robotic Process Automation
      • Security
      • Software Testing
      • Wireless
  • Industries
      • E-Commerce
      • Education
      • Logistics
      • Retail
      • Supply Chain
      • Travel and Hospitality
  • Platforms
      • Microsoft
      • Salesforce
      • SAP
  • Solutions
      • Business Intelligence
      • Cognitive
      • Contact Center
      • CRM
      • Cyber Security
      • Data Center
      • Gamification
      • Procurement
      • Smart City
      • Workflow
  • Home
  • CXO Insights
  • CIO Views
  • Vendor Viewpoint
  • News
  • Conferences
  • Whitepapers
  • CXO Awards
Apac
  • Artificial Intelligence

    Big Data

    Blockchain

    Cloud

    Digital Transformation

    Internet of Things

    Low Code No Code

    MarTech

    Mobile Application

    Robotic Process Automation

    Security

    Software Testing

    Wireless

  • E-Commerce

    Education

    Logistics

    Retail

    Supply Chain

    Travel and Hospitality

  • Microsoft

    Salesforce

    SAP

  • Business Intelligence

    Cognitive

    Contact Center

    CRM

    Cyber Security

    Data Center

    Gamification

    Procurement

    Smart City

    Workflow

Menu
    • Gamification
    • Cyber Security
    • Hotel Management
    • Workflow
    • E-Commerce
    • Business Intelligence
    • MORE
    #

    Apac CIOOutlook Weekly Brief

    ×

    Be first to read the latest tech news, Industry Leader's Insights, and CIO interviews of medium and large enterprises exclusively from Apac CIOOutlook

    Subscribe

    loading

    THANK YOU FOR SUBSCRIBING

    • Home
    • Gamification
    Editor's Pick (1 - 4 of 8)
    left
    Accelerating Digitization Process with Gamification

    Rahul Shinde, CIO and Director Digital Transformation, Duy Tan Plastics Corporation

    Charting A Digital Transformation: Are You Ready?

    Faisal Parvez, Director, IT & CIO Business Partner, Asia Pacific, Middle East & Africa, BT Global Services

    Today's CIO: Survival vs Evolution

    Sundi Balu, CIO, Telstra

    Mastering Technology Selection for Competitive Advantage

    Rob Meilen, VP & CIO, Hunter Douglas

    Smart Use of Current Technology Is Required To Make Gains

    Daniel Lebeau, CIO, GlaxoSmithKline

    Where Technology Meets Tradition in Sports

    Rey Sumaru, General Manager IT & Innovation, Melbourne Cricket Club (MCC)

    Gamification in Korea

    Ching Yip, Head of IT (IT Director), Jeju Dream Tower

    The Evolution of Slot Systems and Gaming Technology

    Chris Garrow, Gaming Operations Director, Prairie Band Casino & Resort

    right

    The Great Threat Intelligence Debate

    Dan Holden, Director-Security Research, Arbor Networks

    Tweet
    content-image

    Dan Holden, Director-Security Research, Arbor Networks

    Input “threat intelligence” into your Google News search engine and over 1.3 million results pop up. It’s become the latest in popular buzzwords in the Internet security industry. But, besides the obvious reasons, why is the industry so hot to trot on the notion of threat intelligence/sharing at the moment?

    Before I address the ‘why’ question, I should take a step back to address the ‘what’ question: what is good cyber threat intelligence, anyway?

    Advanced technologies may be able to detect the vast amount, size and scope of cyber threats out there, issuing alerts when a system is compromised, but without context or relevant information about the attack, security analysts may inadvertently dismiss serious attacks as unimportant noise. Actionable, defensible security intelligence is required to quickly identify threats that are targeting—and have already compromised—your environment.

    The right security intelligence fuels the creation of mechanisms to recognize and block network-based attacks— some of the time. However, effective security intelligence not only identifies attacks, methods, and other indicators, but also understands and catalogs the attack infrastructure, so that broader, more proactive measures can be taken with confidence.

    The main goal for threat intelligence and threat sharing is to get at that much-needed greater context into the events happening on your network or your ‘piece’ of the Internet and how it interacts with the rest of the Internet. It can also make up for the lack of greater context into simple events logged in legacy technologies (firewalls, IDS, anti-virus.) Getting at the why, where, and how of a security event versus just knowing that the event or the indicator of compromise exists.

    The problem with threat intelligence is that it’s become a bit of a big data headache. For effective threat intelligence, you need a giant store of the known ‘bad’— something that changes a million times a day—and the majority of the known bad, you might never interact with at all. It may never apply to your particular slice of the Internet. The efficiencies and costs associated with storing that amount of data isn’t very appealing to most, despite the upside to having your hands on what could be some really great insight into the threats your network is or could be exposed to. This is why many vendors are partnering up to create these shared threat intelligence groups—taking the big data burden off of one and spreading it among many, but in a trusted, smaller-scale, but still effective, environment.

    Given the influx of threats coming at you from every possible angle, entry-point and vector, what is really needed to stay ahead of attackers? Context. That context can help you gauge risk, prioritize your security responder’s time, and move on to the next threat (among many) at hand. In other words, don’t focus on threat intelligence merely for its sake—or because it's the latest hot buzzword in the industry. Threat intelligence data not only needs to be actionable and proven, it also needs to be easily accessible for incident responders to be efficient and effective.

    The goal of threat intelligence shouldn’t be corroborating bad data with more questionable data (because threat intelligence isn’t always proven), but it should be about searching out the best data that fits the risk profile of your particular organization, industry, and risk. At the end of the day, threat intelligence is about tracking the threat actors; naturally everyone will have a different slant or specialty on this. Ultimately, threat intelligence should make a marked improvement over existing staff and processes. If you have a giant library and no time to read anything in that library, then all you have is a bunch of books. No action, no intelligence.

    tag

    Big Data

    Cyber Threats

    Weekly Brief

    loading
    Top 10  Gamification Solutions Companies - 2023
    ON THE DECK

    I agree We use cookies on this website to enhance your user experience. By clicking any link on this page you are giving your consent for us to set cookies. More info

    Read Also

    Navigating Compliance Challenges in ESG AML and Digital Onboarding

    Navigating Compliance Challenges in ESG AML and Digital Onboarding

    Chuan Lim Ang, Managing Director and SG Head of Compliance, CIMB
    A Vision for the Future: Automation, Robotics, and the Smart Factory

    A Vision for the Future: Automation, Robotics, and the Smart Factory

    Joe Tilli, State Industrial Automation Sales Manager, Lawrence & Hanson
    The Rise of Hyper Automation

    The Rise of Hyper Automation

    Erdenezaya Batnasan, Head of IT End-User Support Service Department, Khan Bank
    Transforming Business Operations with Robotic Process Automation

    Transforming Business Operations with Robotic Process Automation

    Simon So, CMGR, MCMI, Regional Head of Digital Solutions, Richemont Asia Pacifi
    Combining Automation with AI to Achieve Human-Like Interaction

    Combining Automation with AI to Achieve Human-Like Interaction

    Kain Chow, General Manager, Technology & Transformation, New World Development Company Limited
    Implementing RPA - 5 Ultimate Prerequisite

    Implementing RPA - 5 Ultimate Prerequisite

    Indra Hidayatullah, Data Management & Analytics Division Head, Pt. Bank Tabungan Negara
    Incorporating the power of recognition into our vendors' sustainability journey

    Incorporating the power of recognition into our vendors' sustainability journey

    Cynthia Khoo, Head, Central Procurement Office, OCBC Bank (Malaysia) Berhad
    Elevating Guest Experience with Data

    Elevating Guest Experience with Data

    Clive Edwards, Senior Vice President, Operations, Capella Hotel Group
    Loading...
    Copyright © 2025 APAC CIOOutlook. All rights reserved. Registration on or use of this site constitutes acceptance of our Terms of Use and Privacy and Anti Spam Policy 

    Home |  CXO Insights |   Subscribe |   Newsletter |   Conferences |   Sitemaps |   About us |   Advertise with us |   Editorial Policy |   Feedback Policy |  

    follow on linkedinfollow on twitter follow on rss
    This content is copyright protected

    However, if you would like to share the information in this article, you may use the link below:

    https://gamification.apacciooutlook.com/cxoinsights/the-great-threat-intelligence-debate-nwid-276.html