Threat intelligence has received a lot of attention from the industry, ranging from vendors expanding their product portfolios and venture capitalists funding new start-ups to end user organizations looking for insights into advanced cyber-attacks that aren’t available from traditional perimeter defense tools. However, threat intelligence in and of itself is just another data source that adds to the complexity and velocity of having to analyze data in a manual fashion.
In the first few weeks of 2016, a new round of data breaches at companies including NationBuilder, MacKeeper, Landry’s, Cottage Health, and Northwest Primary Care have made headlines. They illustrate how difficult it remains to identify risk indicators when cyber attackers, including their strategy, competences, and actions, are unknown. To overcome the inherent limitations of focusing on control gaps and vulnerabilities when performing cyber risk assessments, more and more organizations are turning to threat intelligence to enrich their security detection and response capabilities. Since a threat is the agent that takes advantage of a vulnerability, this relationship must be a key factor in the risk assessment process. It can no longer be treated as risk’s neglected step child.
In fact, advanced security operations teams leverage threat intelligence to gather insight into the capabilities, current activities, and plans of potential threat actors (e.g., hackers, organized criminal groups, or state-sponsored attackers) to anticipate current and future attacks. Sources range from government agencies (e.g., the National Terrorism Advisory System by the U.S. Department of Homeland Security, United States Computer Emergency Readiness Team) and industry information sharing forums (e.g., the Financial Services Information Sharing and Analysis Center, Red Sky Alliance) to commercial threat intelligence services that provide information about IT security threats, vulnerabilities, incidents, and other security-related issues.
Gartner predicts that by 2020, 25% of global enterprises will engage the services of a “cyberwar mercenary” organization, including threat intelligence services. However, organizations must recognize that subscribing to these services only increases the challenges associated with processing and extracting actionable information from security data, which in its raw form remains only a means to an end. Stand-alone threat intelligence services, just like silo-based security tools, only add to the volume, velocity, and complexity of data feeds that must be analyzed, normalized, and prioritized.
Unfortunately, the latter represents one of the biggest challenges in today’s fight against cyber-attacks. Traditional security tools are silo-based and require legions of staff to comb through the huge amount of data to connect the dots and find the needle in the haystack. The bitter truth is that the security industry has too few professionals to tackle these tasks. According to the Information Security Audit and Controls Association (ISACA) there are more than 1 million unfilled security jobs worldwide. Thus, it is not surprising that it takes on average eight months for an advanced threat to be detected in a victim’s network. Even for organizations that can afford a deep bench of security analysts, accumulating distributed data can take months, during which time attackers can exploit vulnerabilities and extract data.
Finally, threat intelligence has little value unless it is put into context of an organization’s security posture. Most don’t have the resources to apply the required logic to correlate external threat data with their internal security intelligence. This results in the underutilization of threat intelligence feeds or requires expensive outside consultants to perform the analysis.
Fortunately, new technologies that take a pro-active approach to cyber risk management are emerging to not only aggregate multiple threat intelligence feeds, but more importantly correlate external and internal security data with its business criticality or risk to the organization. This allows for increased operational efficiency and faster time-to-remediation without requiring expensive consulting services.
Related: Distinguishing Threat Intelligence From Threat Data

Torsten George is a cybersecurity evangelist at Absolute Software, which helps organizations establish resilient security controls on endpoints. He also serves as strategic advisory board member at vulnerability risk management software vendor, NopSec. He is an internationally recognized IT security expert, author, and speaker. Torsten has been part of the global IT security community for more than 27 years and regularly provides commentary and publishes articles on data breaches, insider threats, compliance frameworks, and IT security best practices. He is also the co-author of the Zero Trust Privilege For Dummies book. Torsten has held executive level positions with Centrify, RiskSense, RiskVision (acquired by Resolver, Inc.), ActivIdentity (acquired by HID® Global, an ASSA ABLOY™ Group brand), Digital Link, and Everdream Corporation (acquired by Dell).
More from Torsten George
- Today’s Cyber Defense Challenges: Complexity and a False Sense of Security
- Why Endpoint Resilience Matters
- Ransomware Attacks: Don’t Let Your Guard Down
- Password Dependency: How to Break the Cycle
- Is Enterprise VPN on Life Support or Ripe for Reinvention?
- Cyber Resilience: The New Strategy to Cope With Increased Threats
- Cybersecurity Awareness Month: 5 Actionable Tips
- “Left and Right of Boom” – Having a Winning Strategy
Latest News
- Consolidate Vendors and Products for Better Security
- Pharmaceutical Giant Eisai Takes Systems Offline Following Ransomware Attack
- Vulnerabilities in Honda eCommerce Platform Exposed Customer, Dealer Data
- North Korean Hackers Blamed for $35 Million Atomic Wallet Crypto Theft
- Cisco Patches Critical Vulnerability in Enterprise Collaboration Solutions
- Barracuda Urges Customers to Replace Hacked Email Security Appliances
- Android’s June 2023 Security Update Patches Exploited Arm GPU Vulnerability
- BBC, British Airways, Novia Scotia Among First Big-Name Victims in Global Supply-Chain Hack
