Virtual Event Today: Cyber AI & Automation Summit - Register/Login Now
Connect with us

Hi, what are you looking for?


Incident Response

Data is the Key to Understand Whatever Life Brings

Security Tools and Threat Feeds Are Creating New Types and Formats of Data to be Collected in Massive Volumes

Security Tools and Threat Feeds Are Creating New Types and Formats of Data to be Collected in Massive Volumes

Who could have imagined a few months ago that the term “data model” would have entered our daily lexicon? But it has, as experts try to understand the trajectory and behavior of COVID-19 and share their analysis with the general public. Every researcher seems to have their own approach with a recent article outlining the myriad types of data to consider as we seek to understand how to move forward during and after the pandemic. 

I’ve written before about the parallels between medicine and cybersecurity and here is another example. As security professionals, we never know what life is going to throw at us, but we do know we need the right data to make better decisions and take the right actions, faster. We also understand the challenges behind this seemingly simple premise.  

Mark Harris from Gartner has given great commentary on the evolution of adversary approaches to achieving their goal. He reminds us of how adversaries used to focus on infecting files. As defenders, we spent our time tracking files and hashes and relying on signatures to block these early threats. As the bad guys became more sophisticated, they started infecting systems. So, we expanded our arsenal of tools and layers of defenses to track additional indicators to protect against the latest threats. Now adversaries are infecting organizations, and our strategies must evolve again to address the ever-expanding list of systems, processes and data we must protect. 

As quickly as business models change, adversaries take advantage of new attack vectors – like IoT devices, operational technology and the multiple personal and work devices users now move between. They also leverage human vulnerabilities, impersonating trusted colleagues and third parties to infiltrate organizations. Layering more products and technologies and subscribing to additional, external threat feeds to defend the growing attack surface is generating new types and formats of data to be collected, and in massive volumes. The result is a massive, evolving data management challenge. 

How can you keep pace with dynamic threats and deal with data overload? You need a way to scale up to the volume of data and scale out to incorporate more types of data, so you can focus on what is relevant and take the right action, faster. 

An extensible platform and flexible data model allow you to scale up and out. You can aggregate your data in one manageable location and automatically translate it into a uniform format for analysis. This includes events and associated indicators from inside your environment, for example from your SIEM system, log management repository, case management system and security infrastructure. You can augment and enrich this data automatically with threat data from the multiple sources you subscribe to – commercial, open source, government, industry, existing security vendors – as well as integrating quickly and fully with new frameworks that emerge, like MITRE ATT&CK. By correlating events and associated indicators from inside the environment with external data on indicators, adversaries and their methods, you gain context to understand the who, what, where, when, why and how of an attack. 

With an understanding of relevance to your organization, you can begin to prioritize where to focus first to take action. An extensible platform provides the flexibility to support different use cases, for example spear phishing, threat hunting, fraud detection, vulnerability management and incident response. By integrating with different tools, it allows you to leverage your existing security technologies more efficiently and effectively. What’s more, with the knowledge that you’re starting with the right data, you have greater confidence in your actions. 

Advertisement. Scroll to continue reading.

With an extensible platform and flexible data model, you can take full advantage of the volume and variety of data to gain insights, and the technologies in your ecosystem to accelerate detection and response and mitigate risk. You may not have certainty about the future, but you can be certain in your ability to adapt your capabilities to understand and address whatever life throws your way.

Written By

Marc Solomon is Chief Marketing Officer at ThreatQuotient. He has a strong track record driving growth and building teams for fast growing security companies, resulting in several successful liquidity events. Prior to ThreatQuotient he served as VP of Security Marketing for Cisco following its $2.7 billion acquisition of Sourcefire. While at Sourcefire, Marc served as CMO and SVP of Products. He has also held leadership positions at Fiberlink MaaS360 (acquired by IBM), McAfee (acquired by Intel), Everdream (acquired by Dell), Deloitte Consulting and HP. Marc also serves as an Advisor to a number of technology companies.

Click to comment

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Join us as we delve into the transformative potential of AI, predictive ChatGPT-like tools and automation to detect and defend against cyberattacks.


As cybersecurity breaches and incidents escalate, the cyber insurance ecosystem is undergoing rapid and transformational change.


Expert Insights

Related Content


A recently disclosed vBulletin vulnerability, which had a zero-day status for roughly two days last week, was exploited in a hacker attack targeting the...

Data Breaches

LastPass DevOp engineer's home computer hacked and implanted with keylogging malware as part of a sustained cyberattack that exfiltrated corporate data from the cloud...

Incident Response

Microsoft has rolled out a preview version of Security Copilot, a ChatGPT-powered tool to help organizations automate cybersecurity tasks.

Data Breaches

GoTo said an unidentified threat actor stole encrypted backups and an encryption key for a portion of that data during a 2022 breach.

Application Security

GitHub this week announced the revocation of three certificates used for the GitHub Desktop and Atom applications.

Incident Response

Meta has developed a ten-phase cyber kill chain model that it believes will be more inclusive and more effective than the existing range of...

Artificial Intelligence

Two new surveys stress the need for automation and AI – but one survey raises the additional specter of the growing use of bring...