Wednesday, 24th April 2019
Logo

Actionable threat intelligence is a priority

Mimecast has released the latest report Threat Intelligence: Far-fetched Idea or Must-have Security Tactic? from the Cyber Resilience Think Tank, an independent group of more than a dozen security leaders dedicated to working together to address cyber resilience challenges facing organizations.

In this Mimecast-sponsored report, insights from global IT leaders have been sewn together to offer first-hand prescriptive advice and tactics for navigating the challenges of threat intelligence, including how to make actionable threat intelligence a priority in any sized organization. As one leader explains, “Good, actionable threat intelligence can help tell you who is behind an attack, the tools and tactics used, the who, the how and what they’re after.”

If threat intelligence isn’t built into an organization’s comprehensive cyber resilience strategy, the organization could be vulnerable to phishing attacks, malware incidents or worse. The Cyber Resilience Think Tank recently met to discuss threat intelligence and why it’s a must-have, and obtainable, security asset for organizations of all sizes - regardless of budget.

Malcolm Harkins, Chief Security and Trust Officer at Cylance and Cyber Resilience Think Tank member, said, “As a security industry, we have to move away from being in a constant state of reaction. I want to minimize damage to my organization—I want prevention. I’ve always looked at threat intelligence broadly: What’s my open source intelligence? What’s my human intelligence? What’s my signals intelligence? I want it all, because it all matters.”

The report provides key insights from the group on how to avoid data exhaust; how businesses can use information they already have in-house, like previous data breach and vulnerability reports; and what’s absolutely critical when it comes to implementing this critical security capability. Additional themes throughout the report include:

  • How threat intelligence is not just for the one-percent;
  • How to use open APIs and known threat patterns;
  • How to prove value with little (or no) budget; and
  • Why most threat intelligence is outsourced – and why it is OK.

Maurice Stebilia, CISO at HARMAN and Cyber Resilience Think Tank member, said, “I have various cybersecurity partners collecting intelligence on my behalf. All of their tools I have protecting the cloud, the network, the endpoint—they’ve taken those feeds and built them into their products so if there’s a vulnerability, it’s going to be blocked and captured. And I’ll get an alert.”

According to Marc French, Chief Trust Officer at Mimecast and Cyber Resilience Think Tank member, true intelligence means turning information into action.

Bitglass has announced $70 million in Series D funding from new investor Quadrille Capital and exist...
Keysight has published the third annual Security Report from Ixia, its cybersecurity and visibility...
Sophos study of 10 cloud server honeypots placed worldwide reveals the need for visibility and secur...
NTT Security report shows finance knocks business and professional services off top spot in four mos...
UK CIOs have revealed the huge extent of dark (unused) and unstructured data lurking within and posi...
Agreement provides customers with access to leading ‘Endpoint Protection and Response’ cybersecurity...
Latest Tanium research highlights the IT security and operational trade-offs that UK CIOs and CISOs...
BakerHostetler’s privacy and data protection team has released its 2019 Data Security Incident Respo...