Are There Qualitative Differences Between Threat Intelligence Feeds?

While cyber threat intelligence hype is at an all-time high across the industry, many enterprise organizations are actually building internal programs and processes for threat intelligence consumption, analysis, and operationalization. 

Topics: Cybersecurity Threat Intelligence Lifecycle

Threat Intelligence Sharing Momentum and Needs

Threat intelligence sharing is certainly riding a wave of momentum as we head into the RSA Conference next week. Over the past 6 months, we’ve seen things like lots of federal activity, further adoption of threat intelligence standards, and industry actions.

Topics: Cybersecurity Threat Intelligence Lifecycle cybersecurity legislation

Will Public/Private Threat Intelligence Sharing Work?

In January, Representative Charles Albert “Dutch” Ruppersberger (D-MD) reintroduced the Cyber Intelligence Sharing and Protection Act (CISPA) as H.R. 234 into the 114th Congress.  The bill was first introduced by Mike Rogers (R-MI) in 2011.

Topics: Cybersecurity Threat Intelligence Lifecycle nsa

Threat Intelligence Lifecycle Maturation in the Enterprise Market

According to ESG research from 2012, 65% of enterprise organizations (i.e., more than 1,000 employees) used external threat intelligence as part of their information security analytics activities (note: I am an ESG employee). The two most popular threat intelligence types were related to vulnerabilities and malware (each is consumed by 63% of organizations that use external threat intelligence).

Topics: Information and Risk Management Data Management Security and Privacy Threat Intelligence Lifecycle