www.welivesecurity.com
Open in
urlscan Pro
2a02:26f0:780::210:ca08
Public Scan
URL:
https://www.welivesecurity.com/en/business-security/cyber-threat-intelligence-getting-front-foot-adversaries/
Submission: On November 13 via api from TR — Scanned from DE
Submission: On November 13 via api from TR — Scanned from DE
Form analysis
3 forms found in the DOMGET https://www.welivesecurity.com/en/search
<form data-v-ed6a42ae="" id="searchform" method="get" action="https://www.welivesecurity.com/en/search" autocomplete="off" role="search">
<div data-v-ed6a42ae="" class="search-area"><input data-v-ed6a42ae="" name="term" class="searchbar-input form-control" type="text"
placeholder="Search WeLiveSecurity"><a data-v-ed6a42ae="" class="search-icon-trigger"><span data-v-ed6a42ae="" class="search-icon"></span></a><!----><!----></div><!---->
</form>
GET https://www.welivesecurity.com/en/search
<form data-v-ed6a42ae="" id="searchform" method="get" action="https://www.welivesecurity.com/en/search" autocomplete="off" role="search">
<div data-v-ed6a42ae="" class="search-area"><input data-v-ed6a42ae="" name="term" class="searchbar-input form-control" type="text"
placeholder="Search WeLiveSecurity"><a data-v-ed6a42ae="" class="search-icon-trigger"><span data-v-ed6a42ae="" class="search-icon"></span></a><!----><!----></div><!---->
</form>
POST https://enjoy.eset.com/pub/rf
<form action="https://enjoy.eset.com/pub/rf" class="basic-searchform col-md-12 col-sm-12 col-xs-12 no-padding newsletter px-0" target="_blank" method="post" role="search">
<div class="search-input clearfix">
<input type="text" name="EMAIL_ADDRESS_" value="" placeholder="Your Email Address" required="">
<input type="checkbox" id="TOPIC" name="TOPIC" value="We Live Security Ukraine Newsletter">
<label for="TOPIC">Ukraine Crisis newsletter</label>
<input type="checkbox" id="NEWSLETTER" name="NEWSLETTER" value="We Live Security">
<label for="NEWSLETTER">Regular weekly newsletter</label>
<input type="hidden" name="_ri_" value="X0Gzc2X%3DAQpglLjHJlTQGgXv4jDGEK4KW2uhw0qgUzfwuivmOJOPCgzgo9vsI3VwjpnpgHlpgneHmgJoXX0Gzc2X%3DAQpglLjHJlTQGzbD6yU2pAgzaJM16bkTA7tOwuivmOJOPCgzgo9vsI3">
<input type="hidden" name="_ei_" value="Ep2VKa8UKNIAPP_2GAEW0bY">
<input type="hidden" name="_di_" value="m0a5n0j02duo9clmm4btuu5av8rdtvqfqd03v1hallrvcob47ad0">
<input type="hidden" name="EMAIL_PERMISSION_STATUS_" value="0">
<input type="hidden" name="CONTACT_SOURCE_MOST_RECENT" value="WLS_Subscribe_Form">
<button type="submit" class="redirect-button primary">Subscribe</button>
</div>
</form>
Text Content
Award-winning news, views, and insight from the ESET security community English Español Deutsch Português Français * * TIPS & ADVICE -------------------------------------------------------------------------------- * BUSINESS SECURITY -------------------------------------------------------------------------------- * ESET RESEARCH About ESET ResearchBlogpostsPodcastsWhite papersThreat reports -------------------------------------------------------------------------------- * FEATURED Ukraine crisis – Digital security resource centerWe Live ProgressCOVID-19ResourcesVideos -------------------------------------------------------------------------------- * TOPICS Digital SecurityScamsHow toPrivacyCybercrimeKids onlineSocial mediaInternet of ThingsMalwareRansomwareSecure codingMobile securityCritical infrastructureThreat research -------------------------------------------------------------------------------- * ABOUT US About WeLiveSecurityOur ExpertsContact Us -------------------------------------------------------------------------------- * English EspañolDeutschPortuguêsFrançais * Award-winning news, views, and insight from the ESET security community Business Security CYBER THREAT INTELLIGENCE: GETTING ON THE FRONT FOOT AGAINST ADVERSARIES By collecting, analyzing and contextualizing information about possible cyberthreats, including the most advanced ones, threat intelligence offers a critical method to identify, assess and mitigate cyber risk Phil Muncaster 10 Nov 2023 • , 4 min. read When it comes to mitigating an organization’s cyber risk, knowledge and expertise are power. That alone should make cyber threat intelligence (TI) a key priority for any organization. Unfortunately, this often isn’t the case. Among the various protective measures that IT leaders must consider to help them counter increasingly sophisticated attacks, threat intelligence is often overlooked. This oversight could be a critical mistake, however. By collecting, analyzing and contextualizing information about possible cyberthreats, including the most advanced ones, threat intelligence offers a critical method to identify, assess and mitigate cyber risk. When done right, it can also help your organization to prioritize where to focus its limited resources for maximum effect and so reduce their exposure to threats, minimize damage from potential attacks, and build resilience against future threats. WHAT ARE THE MAIN TYPES OF TI? The challenge for your organization is picking through what is a crowded market of TI vendors to find the right offering. This is, after all, a market predicted to be worth in excess of $44 billion by 2033. There are broadly four types of TI: * Strategic: Delivered to senior leadership via white papers and reports, this offers contextual analysis of broad trends to inform the reader. * Tactical: Aligned with the needs of more hands-on security operations (SecOps) team members, this outlines actor tactics, techniques, and procedures (TTPs) to provide visibility into the attack surface and how malicious actors can compromise the environment. * Technical: Helps SecOps analysts monitor for new threats or investigate existing ones using indicators of compromise (IOCs). * Operational: Also uses IOCs, but this time to track adversary movements and understand the techniques being used during an attack. While strategic and tactical TI focus on longer term goals, the latter two categories are concerned with uncovering the “what?” of attacks in the short term. WHAT TO LOOK FOR IN A THREAT INTEL SOLUTION There are various ways that organizations can consume threat intelligence, including industry feeds, open source intelligence (OSINT), peer-to-peer sharing within verticals, and direct from vendors. It goes without saying that there are a number of the latter offering their expertise in this area. In fact, Forrester recorded a 49% increase in paid commercial threat intelligence feeds from 2021 to 2022. However, you’re best advised to focus on the following when assessing whether a vendor is the right fit for your organization: * Completeness: They should offer a comprehensive range of TI covering a wide range of threat actors, threat vectors, and data sources – including internal telemetry, OSINT and external feeds. IOC feeds should be thought of as part of a holistic TI service rather than a standalone. * Accuracy: Inaccurate intelligence can overwhelm analysts with noise. Vendors must deliver precision. * Relevance: Feeds should be tailored to your specific environment, industry and company size, as well as what is most relevant (tactical/strategic) to your organization over the short and longer terms. Also consider who is going to use the service. TI is expanding to new personas all the time; even marketing, compliance and legal teams. * Timeliness: Threats move quickly so any feed must be updated in real time to be useful. * Scalability: Any vendor should be able to meet the TI needs of your organization as it grows. * Reputation: It always pays to go with a vendor that can boast a track record of TI success. Increasingly, this may be a vendor not traditionally associated with TI, but rather SOAR, XDR or similar adjacent areas. * Integration: Consider solutions which fit neatly into your existing security infrastructure, including SIEM and SOAR platforms. NAVIGATING THE TI MARKET The TI market is constantly evolving, with new categories emerging to help evaluate new threats. That can make choosing the right option(s) a challenge. It pays to think longer term about your requirements to avoid constant reassessment of strategy, although this must be balanced by the need for relevance and agility. It’s also worth bearing in mind that the maturity of your organization will play a big part in how many and what type of TI services to adopt. Those with dedicated teams and resource may consume as many as 15 sources of TI across commercial, OSINT, and free offerings. Today’s threat actors are well resourced, dynamic, determined and can leverage the element of surprise. TI is one of the best ways organizations can level the playing field and gain the upper hand, including by understanding their adversary, assessing the threat landscape and making better informed decisions. That’s the way not only to stop attacks in their tracks before they can make an impact on the organization, but also to build resilience for the future. Each organization will need to choose the blend of TI right for them. But when looking at vendors, ensure the data is at least complete, accurate, relevant and timely. Curated feeds will go a long way to saving time and resource for your own team. The key is to find a vendor whose feeds you trust. According to IDC, 80% of G2000 companies will increase investment in threat intelligence by 2024. Make sure you’re set up to succeed. -------------------------------------------------------------------------------- LET US KEEP YOU UP TO DATE Sign up for our newsletters Ukraine Crisis newsletter Regular weekly newsletter Subscribe RELATED ARTICLES -------------------------------------------------------------------------------- Business Security Navigating the security and privacy challenges of large language models Business Security Navigating the security and privacy challenges of large language models • -------------------------------------------------------------------------------- Business Security Strengthening the weakest link: top 3 security awareness topics for your employees Business Security Strengthening the weakest link: top 3 security awareness topics for your employees • -------------------------------------------------------------------------------- Business Security Better safe than sorry: 10 tips to build an effective business backup strategy Business Security Better safe than sorry: 10 tips to build an effective business backup strategy • SIMILAR ARTICLES Business Security Staying ahead of threats: 5 cybercrime trends to watch -------------------------------------------------------------------------------- Business Security A first look at threat intelligence and threat hunting tools -------------------------------------------------------------------------------- Less Technical OSINT 101: What is open source intelligence and how is it used? -------------------------------------------------------------------------------- SHARE ARTICLE DISCUSSION Award-winning news, views, and insight from the ESET security community About us ESET Contact us Privacy Policy Legal Information Manage Cookies RSS Feed Copyright © ESET, All Rights Reserved Your account, your cookies choice We and our partners use cookies to give you the best optimized online experience, analyze our website traffic, and serve you with personalized ads. You can agree to the collection of all cookies by clicking "Accept all and close" or adjust your cookie settings by clicking "Manage cookies". You also have the right to withdraw your consent to cookies anytime. For more information, please see our Cookie Policy. Accept all and close Manage cookies Essential cookies These first-party cookies are necessary for the functioning and security of our website and the services you require. They are usually set in response to your actions to enable the use of certain functionality, such as remembering your cookie preferences, logging in, or holding items in your cart. You can´t opt out of these cookies, and blocking them via a browser may affect site functionality. Basic Analytical Cookies These first-party cookies enable us to measure the number of visitors/users of our website and create aggregated usage and performance statistics with the help of our trusted partners. We use them to get the basic insight into our website traffic and our campaign performance and to solve bugs on our website. Advanced Analytical Cookies These first or third-party cookies help us understand how you interact with our website and each offered service by enriching our datasets with data from third-party tools. We use these cookies to improve our website, services, and user experience, find and solve bugs or other problems with them, and evaluate our campaigns´ effectiveness. Marketing cookies These third-party cookies allow our marketing partners to track some of your activities on our website (for example, when you download or buy our product) to learn about your interests and needs and to show you more relevant targeted ads. Accept and close Back