Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Network Security

Emerging Threats Teams With IID on Threat Intelligence

Cyber threat intelligence firm IID announced this week that Emerging Threats, a provider of threat intelligence recently acquired by Proofpoint for $40 million, will make some of its data available via IID’s threat intelligence management system, ActiveTrust.

Cyber threat intelligence firm IID announced this week that Emerging Threats, a provider of threat intelligence recently acquired by Proofpoint for $40 million, will make some of its data available via IID’s threat intelligence management system, ActiveTrust.

Launched in February 2014, ActiveTrust is an information-sharing platform where government agencies and enterprises can share data about the latest threats and ongoing attacks. The platform can sift through threat data from thousands of sources, and transform it into actionable intelligence delivered to security professionals and automated infrastructure.

Emerging Threats’ intelligence will be available as a premium data feed to ActiveTrust customers and can be fed into any organization’s cybersecurity infrastructure. Data provided to IID’s ActiveTrust platform by Emerging Threats includes:

ETOpen Rule Set – Open source IPS/IDS rule set for Snort and Suricata platforms

ETPro Rule Set – Comprehensive Malware-focused IPS/IDS rule set for Snort, Suricata and other platforms

IQRisk Rep List – Dynamic feed of IP and domain reputations sourced from global threat intelligence network

IQRisk Query – Database with 5 years of global threat activity and deep context for threat research and incident response

“Emerging Threats provides some of the most timely, accurate and meaningful cyberthreat intelligence available so it only made sense for us to make its data available to ActiveTrust customers,” said Lars Harvey, CEO of Tacoma, Washington-based IID. “We’re looking forward to our customers being able to put this premium data into action in any of their cyber defenses alongside the thousands of other data sources that IID is analyzing around the clock.”

Advertisement. Scroll to continue reading.

Late last year, IID hired former McAfee VP Kelly Haggerty as the company’s Chief Product Officer, who now oversees product strategy, including development and management of ActiveTrust. 

Written By

For more than 15 years, Mike Lennon has been closely monitoring the threat landscape and analyzing trends in the National Security and enterprise cybersecurity space. In his role at SecurityWeek, he oversees the editorial direction of the publication and is the Director of several leading security industry conferences around the world.

Click to comment

Trending

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Join the session as we discuss the challenges and best practices for cybersecurity leaders managing cloud identities.

Register

SecurityWeek’s Ransomware Resilience and Recovery Summit helps businesses to plan, prepare, and recover from a ransomware incident.

Register

Expert Insights

Related Content

Cybercrime

The changing nature of what we still generally call ransomware will continue through 2023, driven by three primary conditions.

Data Protection

The cryptopocalypse is the point at which quantum computing becomes powerful enough to use Shor’s algorithm to crack PKI encryption.

Cybercrime

As it evolves, web3 will contain and increase all the security issues of web2 – and perhaps add a few more.

Identity & Access

Zero trust is not a replacement for identity and access management (IAM), but is the extension of IAM principles from people to everyone and...

Malware & Threats

The NSA and FBI warn that a Chinese state-sponsored APT called BlackTech is hacking into network edge devices and using firmware implants to silently...

Artificial Intelligence

The degree of danger that may be introduced when adversaries start to use AI as an effective weapon of attack rather than a tool...

Cybersecurity Funding

Network security provider Corsa Security last week announced that it has raised $10 million from Roadmap Capital. To date, the company has raised $50...

Network Security

Attack surface management is nothing short of a complete methodology for providing effective cybersecurity. It doesn’t seek to protect everything, but concentrates on areas...