Friday, February 26, 2021
CybersecFill
Advertisement
  • Home
  • Events
  • News
  • security tips
  • Article
  • Contact Us
No Result
View All Result
  • Home
  • Events
  • News
  • security tips
  • Article
  • Contact Us
No Result
View All Result
CybersecFill
No Result
View All Result
Home Blog

Cyber Threat Intelligence

Simbiat Sadiq by Simbiat Sadiq
February 7, 2020
in Blog
0
Cyber Threat Intelligence
Share on FacebookShare on Twitter

Why Threat Intelligence?

The power to predict future attacks even before they reach targeted networks can help organizations prioritize their responses, speeding up the decision-making process as well as response time, providing better security altogether. This is one of the importance of threat intelligence.

To enhance security posture of your organization, threat intelligence is needed. It helps in gathering actionable data(IOCs), evaluating security posture and staying on track with the latest modes of attacks among others.

What is Threat Intelligence?

Threat Intelligence is the information that organizations use to understand cyber attackers(threats) to their organization. This includes techniques that allows analyst to identify attacks in their network which enables them to adequately respond or prepare for future attacks. In simple words, “Threat intelligence is data on threats.”

Threat intelligence should be informative an actionable. It should contain information that are clear and can drive actions E.g having an intelligence report that includes, Ip addresses, domain addresses, file names associated. This are information that can be put into action by searching your infrastructures using to determine if there has been an infection using provided information in the threat Intelligence.

One of the primary benefits of threat intelligence is that it helps security professionals better understand the adversary’s decision-making process. For example, if you know which vulnerabilities an adversary is exploiting, you can choose the technologies and patching activities that will best mitigate exposure to those vulnerabilities. – Crowdstrike

Type of Threat Intelligence.

There are three types of threat intelligence- This are strategic, tactical and operational threat intelligence.

Strategic Threat Intelligence

Strategic threat intelligence examines trends in in cyber-attacks, what cyber threats are prevalent and what industries are major targets. Strategic threat intelligence informs the senior management (CISO/ CIO) about security risks and controls that should be in place to ensure that organisation is addressing threat landscape.

It answers the question.

WHO is the adversary?

WHY are they targeting you?

WHERE have they attacked prior to attacking you?

Tactical Threat Intelligence

This provides information which consists of Indicators of Compromise (IOC)/ Tactics, Techniques and Procedure (TTP). This is the most basic form of intelligence and it is often used for detection of threats, and for incident responders to search for specific known signatures.

Tactical Intelligence answers the WHAT and WHEN question.

WHAT tool does the attacker use?

WHEN are those attacks carried out

Operational Threat Intelligence

Operational Threat Intelligence gives data and information about the goal of a cyber-attack. This provides context for security events and incidents. This intelligence is mostly uncovered by forensic investigators and incident responders. This includes -tools for a particular threat group, emerging tactics, techniques and procedures among others

Conclusion

Threat intelligence gives you a visibility of your security posture and alerts you about potential threats coming your way.To stay up to date with threat intelligence, you need to be in sync with threat intelligence reports. There are several third parties that collect and gather cyber threat intelligence. This Includes; FireEye – a leading source in threat intelligence. They create and publish an annual threat report and regularly publish threat intelligence reports, Crowdstrike, Palo Alto- Unit42, Cylance blog and a host of others

Subscribe To Our Newsletter

Join our mailing list to receive the latest news and updates from our team.

You have Successfully Subscribed!

Tags: BingCyber SecuritycyberintelligenceGoogleNigeriaThreat Intelligence
Simbiat Sadiq

Simbiat Sadiq

Next Post
darknetcybersecfill

Darknet: Source of Actionable Intelligence

Subscribe

Subscribe To Our Newsletter

Subscribe To Our Newsletter

Join our mailing list to receive the latest news and updates from our team.

You have Successfully Subscribed!

  • Trending
  • Comments
  • Latest
Wifi 6 Security

Did Wi-Fi 6 come with an Improvement In Security?

May 13, 2019
credit card cloning

How Credit/Debit Cards are Cloned / Preventing Card Cloning

December 26, 2019
Nationa Cybersecurity Strategy

A Review of the Nigeria National Cybersecurity Strategy

July 1, 2019
Wireless Access Point

How To Secure Your Wireless Access Point (WAP)

August 3, 2019
Facebook

Facebook’s New Settings Allows Hackers To Easily Pentest Facebook,Instagram Mobile Applications

8
Nationa Cybersecurity Strategy

A Review of the Nigeria National Cybersecurity Strategy

6
Cybersecurity Jobs

Cybersecurity Jobs – You can create your own Cybersecurity Role

4
open Source intelligence tools

Open Source Intelligence tools – OSINT

4
Cybersecurity for Remote Workers: 8 ways to work safer…

Cybersecurity for Remote Workers: 8 ways to work safer…

February 24, 2021
Cloud Account Hijacking

Cloud Account Hijacking

February 22, 2021
Password Manager…Pros and Cons

Password Manager…Pros and Cons

February 23, 2021
How Secure is a VPN? What makes a Safe VPN?

How Secure is a VPN? What makes a Safe VPN?

February 17, 2021

Recommended

Cybersecurity for Remote Workers: 8 ways to work safer…

Cybersecurity for Remote Workers: 8 ways to work safer…

February 24, 2021
Cloud Account Hijacking

Cloud Account Hijacking

February 22, 2021
Password Manager…Pros and Cons

Password Manager…Pros and Cons

February 23, 2021
How Secure is a VPN? What makes a Safe VPN?

How Secure is a VPN? What makes a Safe VPN?

February 17, 2021

© 2020 CybersecFill. All Rights Reserved.

No Result
View All Result
  • Home
  • Events
  • News
  • security tips
  • Article
  • Contact Us

© 2020 CybersecFill. All Rights Reserved.