Attacks/Breaches

12/19/2017
10:30 AM
Adam Meyers
Adam Meyers
Commentary
Connect Directly
Twitter
RSS
E-Mail vvv
100%
0%

Comprehensive Endpoint Protection Requires the Right Cyber Threat Intelligence

CTI falls into three main categories -- tactical, operational, and strategic -- and answers questions related to the "who, what, and why" of a cyber attack.

A recent report from Grand View Research predicts that the cyber threat intelligence (CTI) market will reach $12.6 billion by 2025. This growth in demand isn't surprising when you consider the ongoing success of so many high-profile and extremely damaging attacks. This climate of increasingly sophisticated breaches has moved many organizations — particularly, those that handle and retain sensitive data — to upgrade their cybersecurity measures by adding CTI and incident forensics.

Different Types of CTI
Acknowledging the need to integrate CTI into your security strategy to more comprehensively protect endpoints is only the first step. Threat intelligence comes in many forms, and discerning the relative value of a CTI solution can be confusing. Granted, there are a variety of free open source intelligence feeds available, but leveraging them can put a strain on IT security resources and divert security operations center managers and threat analysts from the security planning and prevention tasks that are vital to their roles.

If you're considering adding threat intelligence to your security strategy, it's important to understand that CTI falls into three main categories — tactical, operational, and strategic — and all play a role in achieving comprehensive cybersecurity. Collectively, they answer questions related to the "who, what, and why" of a cyber incident. The following are brief descriptions of each type:

  • Tactical CTI: This form of CTI answers the "what" of a cyber incident and consists largely of bad IP addresses, URLs, file hashes, known malicious domain names, etc. Tactical CTI is the easiest to gather and is available through open source feeds. In addition, this intelligence is short-term in nature because it can be outdated almost as soon as it arrives.
  • Operational CTI: This form of intelligence analyzes and profiles threat actors and adversaries: the "who" behind the attacks. While still fairly short-term in nature, operational CTI requires human analysis because it adds context by delving into the motivations, intentions, and capabilities of attackers.
  • Strategic CTI: Strategic CTI is long-term and takes a geopolitical view that analyzes risk factors such as global events, foreign policy factors, and other local and international movements and agendas that can affect your organization's safety. It is the most difficult type of intelligence to generate because it requires data collection by human analysts with a deep understanding of cybersecurity and the nuances of geopolitical circumstances. Due to its complexity, this intelligence is delivered in detailed, in-depth reports. Strategic CTI answers questions related to the "why" of an incident.

How CTI Can Be a Powerful Addition to Your Cybersecurity
Regardless of the threat level you face, CTI provides value only when it's actionable. Simply integrating open source threat feeds with existing security products, such as an intrusion prevention system, next-generation firewall, or security information and event management (SIEM) system, can't provide the kind of intelligence needed to mitigate risk or remediate a problem. Although some companies struggle to implement this intelligence effectively, CTI can be a powerful tool when applied correctly. The following are examples of how CTI can be used to increase your organization's cybersecurity:

  • CTI can optimize prevention and strengthen defenses in anticipation of an attack: Operational CTI provides details on adversaries and helps recognize early-warning signs predicting an attack in the making, allowing security teams to mitigate risks.
  • CTI can accelerate detection time: The ingestion and application of technical indicators into a SIEM system or endpoint detection and response tools fortifies them with the latest intelligence. This allows such solutions to automatically correlate and detect incidents faster by eliminating the requirement of waiting for a product update or for the creation of new detection rules.
  • CTI can speed investigation and incident response times: By providing context and attribution, threat intelligence helps prioritize responses and accelerate investigations. With context and attribution, incident management becomes less unwieldy; security teams can start to separate the "forest from the trees" and apply correct prioritization to their workflows.
  • CTI can empower better security and executive decisions: Knowing which adversaries are likely to target your organization and why allows decision-makers to allocate the defenses and resources necessary to protect assets that are most at risk. At a higher level, executive decisions may include identifying and weighing the risk/reward equation of business outcomes, allowing stakeholders to select the option that presents the least risk for the highest reward.

Related Content:

Adam Meyers has over a decade of experience within the information security industry. He has authored numerous papers that have appeared at peer reviewed industry venues and has received awards for his dedication to the field. At CrowdStrike, Adam serves as the VP of ... View Full Bio
Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
DoothCom
50%
50%
DoothCom,
User Rank: Apprentice
12/19/2017 | 2:47:02 PM
Threat Intelligence
 So what would the learning curve look like for older companies adjusting to this CTI campaign? Would it be possible or is this all a young company game now? 
Valentine's Emails Laced with Gandcrab Ransomware
Kelly Sheridan, Staff Editor, Dark Reading,  2/14/2019
High Stress Levels Impacting CISOs Physically, Mentally
Jai Vijayan, Freelance writer,  2/14/2019
Mozilla, Internet Society and Others Pressure Retailers to Demand Secure IoT Products
Curtis Franklin Jr., Senior Editor at Dark Reading,  2/14/2019
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
5 Emerging Cyber Threats to Watch for in 2019
Online attackers are constantly developing new, innovative ways to break into the enterprise. This Dark Reading Tech Digest gives an in-depth look at five emerging attack trends and exploits your security team should look out for, along with helpful recommendations on how you can prevent your organization from falling victim.
Flash Poll
How Enterprises Are Attacking the Cybersecurity Problem
How Enterprises Are Attacking the Cybersecurity Problem
Data breach fears and the need to comply with regulations such as GDPR are two major drivers increased spending on security products and technologies. But other factors are contributing to the trend as well. Find out more about how enterprises are attacking the cybersecurity problem by reading our report today.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2019-8933
PUBLISHED: 2019-02-19
In DedeCMS 5.7SP2, attackers can upload a .php file to the uploads/ directory (without being blocked by the Web Application Firewall), and then execute this file, via this sequence of steps: visiting the management page, clicking on the template, clicking on Default Template Management, clicking on ...
CVE-2019-7629
PUBLISHED: 2019-02-18
Stack-based buffer overflow in the strip_vt102_codes function in TinTin++ 2.01.6 and WinTin++ 2.01.6 allows remote attackers to execute arbitrary code by sending a long message to the client.
CVE-2019-8919
PUBLISHED: 2019-02-18
The seadroid (aka Seafile Android Client) application through 2.2.13 for Android always uses the same Initialization Vector (IV) with Cipher Block Chaining (CBC) Mode to encrypt private data, making it easier to conduct chosen-plaintext attacks or dictionary attacks.
CVE-2019-8917
PUBLISHED: 2019-02-18
SolarWinds Orion NPM before 12.4 suffers from a SYSTEM remote code execution vulnerability in the OrionModuleEngine service. This service establishes a NetTcpBinding endpoint that allows remote, unauthenticated clients to connect and call publicly exposed methods. The InvokeActionMethod method may b...
CVE-2019-8908
PUBLISHED: 2019-02-18
An issue was discovered in WTCMS 1.0. It allows remote attackers to execute arbitrary PHP code by going to the "Setting -> Mailbox configuration -> Registration email template" screen, and uploading an image file, as demonstrated by a .php filename and the "Content-Type: image/g...