5 Reasons Enterprises Dont Get Enough Value From Threat Intelligence

  /     /     /  
Publicated : 22/11/2024   Category : security


5 Reasons Enterprises Dont Get Enough Value From Threat Intelligence


Maturity levels still keeping threat intelligence efficacy stunted.



The last couple of weeks have seen some interesting studies and observations surface on the state of threat intelligence today. Consensus shows that while many organizations are at very least recognizing the value of threat intelligence as a way to speed up incident response time, there are still plenty of impediments stunting the efficacy of enterprise threat intel programs.
1. They Dont Know What It Is
One thing that the surveys and reports on threat intelligence have made clear over the past year is that like any buzzworthy category, threat intelligences definition has been well- and truly mucked by the marketers. At this point, every vendor with any kind of aggregation of real-time information has slapped the label of threat intel on it, thereby confusing the heck out of buyers.
A
report out by IDC on behalf of SecureData
last week illustrates the confusion. About 90% of respondents said they were familiar with the term threat intelligence. Digging further, though, while 77% equated SIEM to threat intel, only 35% understood threat intelligence to be shared information provided within the security community. Just 11% connected behavior analysis to threat intelligence activities.
“Threat intelligence is not simply information,” wrote Duncan Brown, research director for IDC and author of the report. “It is a service delivering a collated and correlated range of data feeds and sources to provide actionable advice to security operations. Our study suggests firms are taking a somewhat traditional view of intelligence that discounts more innovative developments.”
2. The Datas Not Actionable
According to a
report out from the Ponemon Institute
earlier this month, only about a third of IT security leaders say the threat intelligence they receive has a high level of effectiveness.
As
Rick Holland of Forrester advised recently
, organizations need to pick threat intelligence feeds based on relevancy to their business and start ignoring vendors that try to distract with bright and shiny claims of having large networks of sensors.
If a vendors collection capabilities dont produce threat intelligence that is relevant to your organization and threat model, then its nothing more than window dressing, he writes. When it comes to actionable intelligence, relevancy matters.
3. Theyre Fixated On External Feeds
Organizations may not be able to determine how to pick a relevant feed from an irrelevant feed because in many instances theyre not looking in the mirror first before they seek out third-party threat intelligence solutions.
Nothing will be as relevant to you as intelligence gathered from your own environment, your own intrusions. Before you invest six figures or more in third party threat intelligence, make sure you are investing in your internal capabilities, Holland says.
4. Theyre Not Contextualizing Data
The truth is that even with increased usage of SIEM for event correlation, IDC finds that organizations simply are not doing the work of turning internal incident information into contextual clues about threat behavior. Just over a third of organizations marry up external threat intelligence with internal data feeds.
And even internally, the contextualization of attack patterns is not very robust--under 60% of organizations fold in data from firewalls and UTM devices, just 38% pull in application security data, and only about a quarter of organizations use physical security information.
5. Nobodys In Charge
Perhaps a big part of the problem is that organizations arent putting their backs into it yet. Ponemon found that only about 35% of organizations today have a dedicated team that centrally manages threat intelligence. To be fair, that number jumped up by seven percentage points over the past year, so things are getting better.
But the fact is that threat intelligence is hard.
The range of data feeds, both within an organization and externally, can be vast, and security operations often risk being overwhelmed with data from events and alerts, writes Brown, anddigesting threat information can be a slow and painful process.
Thats why it takes a mature, programmatic approach to yield meaningful benefits.
 

Last News

▸ Sony, XBox Targeted by DDoS Attacks, Hacktivist Threats ◂
Discovered: 23/12/2024
Category: security

▸ There are plenty of online tools for reporting bugs. ◂
Discovered: 23/12/2024
Category: security

▸ 27 Million South Koreans Hit by Online Gaming Theft. ◂
Discovered: 23/12/2024
Category: security


Cyber Security Categories
Google Dorks Database
Exploits Vulnerability
Exploit Shellcodes

CVE List
Tools/Apps
News/Aarticles

Phishing Database
Deepfake Detection
Trends/Statistics & Live Infos



Tags:
5 Reasons Enterprises Dont Get Enough Value From Threat Intelligence