UK backed framework for threat intelligence released

MWR InfoSecurity reviews the threat intelligence landscape to produce CPNI and CERT-UK supported guidance for organisations.

MWR InfoSecurity has released a CPNI and CERT-UK supported study entitled Threat Intelligence: Collecting, Analysing, Evaluating, that aims to remove the confusion around threat intelligence and gives vendor neutral advice that can be scaled to different sectors, sizes of organisation, and organisational goals. Whilst high on organisations' RADARs, little consensus exists as to what threat intelligence is, and many companies risk investing huge sums of money with little effect on security. The in-depth report, authored by MWR senior security researcher Dr David Chismon, breaks down the wide range of things marketed as threat intelligence into distinct types, and advises how to build and evaluate a successful threat intelligence programme - and crucially, how not to build one - as well as detailed advice on collecting, analysing, acting on and sharing the information obtained.


“Threat intelligence is rapidly becoming an ever-higher business priority with a general awareness of the need to ‘do’ threat intelligence, but vendors are falling over themselves to offer a confusingly diverse array of threat intelligence products,” said Dr David Chismon, senior security researcher at MWR InfoSecurity and principal author of the report. “There is a risk that in the hurry to keep up with the threat intelligence trend, organisations will end up paying large amounts of money for products that are interesting but of little value in terms of improving the security of their business. ‘Doing’ threat intelligence is important – but doing it right is critical.”


To address this, CPNI and CERT-UK contracted MWR InfoSecurity to review the area and provide a framework for threat intelligence. The resulting paper is the product of literature reviews, internal experience, and a large number of interviews with people involved in threat intelligence and related fields across a range of organisations.


“By taking threat intelligence back to its intelligence roots and applying the same strict principles, it quickly becomes clear that effective threat intelligence focuses on the questions that an organisation wants answered, rather than simply attempting to collect, process, and act on vast quantities of data,” said Dr Chismon. “Yet, it’s vital to be asking the right questions in the first place. Hence this paper looks in detail at the cycle of setting requirements, collecting and analysing data, turning the results into a consumable product and evaluating the usefulness of that product – which then feeds back into asking ‘better’, more useful questions for the future.”


In addition, a helpful “Quick Wins” section is included with actions that organisations can take today, regardless of staff and budget constraints, in order to improve internal threat intelligence practices. Importantly, it assumes no specific current security infrastructure, such as SIEM tools, IDS tools or log aggregation and analysis. 

A partnership between Applied Computing, Wipro and Databricks focuses on deploying AI in energy...
Smart Communications announces Satish Shenoy as Senior VP to enhance global partner strategy and...
Databricks is set to invest over $850 million in the UK to expand their AI and data ambitions,...
TXP has partnered with Otera to support the deployment of AI decision agents in UK mid-market...
Apex Computing has achieved a third Microsoft Solutions Partner designation, adding Microsoft...
Dynatrace announces acquisition of Bindplane to help strengthen its observability capabilities and...
Infosys and Harness have entered a strategic partnership to integrate AI into software delivery,...
Emerson Electric has updated its Guardian Digital Platform with additional AI capabilities and...