Security News

Whether working within a company that has deployed an advanced intelligence program or in one just getting started, there are steps we can take to ensure we're investing in the right mix of products, services and feeds. Data is the lifeblood of threat intelligence programs, but we can't implement a successful program based on feeds alone.

Flashpoint already produces the industry's highest-quality threat intelligence from online illicit communities. By integrating CRFT's no-code security automation into Flashpoint's product suite, the company is now positioned to empower Cyber Threat Intelligence, Fraud, and Security teams to take rapid, automated action from inbound intelligence and event-based alerts.

People have preconceived notions of what threat intelligence is, so they make assumptions in conversations and those assumptions are rarely thought about, much less discussed. The assumption and filter is that threat intelligence equals external threat data.

The purpose of threat intelligence is to collect data from a variety of sources outside of the organization's perimeters and generate intelligence on what is happening "Out there", enriching the organization's security operations. Threat intelligence provides visibility that extends beyond the organization's perimeters - and this visibility is based on the vendor's coverage on intelligence sources.

The growing volume and complexities of cyber threats present a compelling case for adopting threat intelligence platforms, a Frost & Sullivan analysis finds. These solutions help organizations navigate the ever-increasing threat landscape and allow for further analysis and threat intelligence operationalization.

Cyber threat intelligence sharing is a critical tool for security analysts. Common challenges for beginning a cyber threat intelligence sharing program.

iProov has launched the world's first system of global threat intelligence for biometric assurance. iSOC's threat intelligence provides forewarning of major new attacks and enables iProov to prepare and defend against them.

Netskope announced the Cloud Threat Exchange, one of the industry's first cloud-based solutions for the ingestion, curation, and real-time sharing of threat intelligence across enterprise security enforcement points. Any certified, partner, vendor, or customer may use Cloud Threat Exchange to automate the delivery and distribution of high-value, actionable threat intelligence, thus reducing the time to protection and eliminating gaps in coverage.

Some intelligence services focus their efforts on identifying threat actor groups and attack methods, informing their customers whether they are targeted or not. Some terms are beginning to emerge to better define intelligence offerings, with the most prominent one being Digital Risk Protection, or DPO. While it is used by many vendors to describe services designed to identify external threats, it does often time seem to include the traditional "Threat intelligence" as part of the vendor's offering, such as malware IOCs, blurring the lines between the two terms.

The Trustworthy Accountability Group announced the hiring of Danielle Meah, former Global Head of Threat Intelligence for Citigroup, as TAG's first Director of Threat Intelligence. In her new role, Meah will lead the TAG Threat Exchange and work with the industry to foster an effective threat-sharing culture.