Glossary

Threat intelligence


A


B


C


D


E


F


G


H


I


J


K


L


M


N


O


P


Q


R


S


T


U


V


W


X


Y


Z

    What is threat intelligence?

    Threat intelligence can be derived from external sources, such as open-source information sharing or communications between threat information-sharing groups. It can also come from internal information sources, such as an organization’s Security Information and Event Management (SIEM) or log management tool. Threat intelligence feeds directly into other critical enterprise security functions like security planning, incident response, alerts and blocking.

    Broadly speaking, sources of threat intelligence can be placed in two separate categories: internal and external.

    • Internal threat intelligence requires IT organizations to source and analyze data from their networks, including event and application logs, firewall logs, DNS logs and other sources. IT organizations can also maintain information about past security events to help extract further threat intelligence. This could include data on the systems that were affected in the incident, what specific vulnerabilities were exploited by the attacker and what indicators of compromise (IoC) were detected, along with package data and other raw supporting data.
    • External threat intelligence entails sourcing threat intelligence from a variety of sources outside the organization. These can include open source intelligence that is publicly available, like blogs, news reports, public block lists, private or commercial sources such as vendors of threat intelligence software, and even corporate sharing groups that have agreed to pool information on potential cyber security threats.

    Evidence-based threat intelligence means that the threat has been rigorously validated and the IT organization has confirmed that the threat is real. Without adequate evidence, any perceived threat might not be real, so it is vital that IT organizations can produce or view real evidence of a given threat. It is easy to produce evidence for threats that are discovered internally, but the IT organization may have to rely on its partners to provide evidence for threats that are discovered externally.

    A good piece of threat intelligence should have some utility for the organization. There needs to be a strong potential for intelligence to impact security incidents positively.

    Threat intelligence should also be actionable, meaning it should drive the development of a new security control or policy that mitigates the threat. In many cases, security analysts can achieve this by configuring an alert when the threat is detected via an IOC.

    1. Strategic intelligence provides a high-level, risk-based viewpoint that is most relevant for executive decision-makers rather than being directly actionable by IT security analysts.
    2. Tactical intelligence contains detailed information about the threat tactics, techniques and procedures (sometimes abbreviated TTP) for carrying out a specific type of cyber attack.
    3. Operational intelligence consists of actionable information about a specific upcoming attack. Operational Intelligence is rarer than other types of threat intelligence but can serve as a timely warning against an upcoming security threat.
    4. Technical intelligence is mostly derived from internal sources and consists of technical threat indicators picked up through event logs aggregated in a SIEM.

    FAQs

    Machine learning and artificial intelligence algorithms can collect and analyze vast amounts of threat data to identify potential threats, patterns and anomalies that may go unnoticed. With machine learning models, organizations can automate threat intelligence feeds to detect cyber threats, predict future attack trends, prioritize security alerts and continuously improve their threat detection and response mechanisms.

    When selecting a threat intelligence platform, look for real-time threat detection capabilities, integration with existing security tools, automation of threat analysis, customizable threat feeds, scalability for growing needs and a user-friendly interface for security professionals.

    A threat intelligence program is a comprehensive initiative that involves the systematic collection, analysis and dissemination of data and insights related to cybersecurity threats. It is designed to help security teams identify potential threats, understand the threat landscape and effectively respond to cyber-attacks.