Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Threat Intelligence

4/23/2018
04:50 PM
Connect Directly
Twitter
LinkedIn
Google+
RSS
E-Mail
50%
50%

Threat Intel: Finding Balance in an Overcrowded Market

Industry insiders discuss how threat intelligence has changed and what may happen as the market becomes increasingly saturated.

If you were at last week's RSA Conference in San Francisco, chances are good you heard someone talk about data visibility. The influx of connected devices and the rise of cloud adoption are driving concerns about information management: how can companies view and secure the data they have in environments with shrinking perimeters and larger attack surfaces?

The "legacy mode" of threat intel traditionally has been a tactical feed of malicious IP addresses feeding into the security operations center or security information and event management system with little context or relation to the business impact or risk, Flashpoint CEO Josh Lefkowitz said in an interview with Dark Reading.

Over the last two years, the shape of threat data has evolved. "We've seen a shift toward more correlation and understanding that intelligence needs to drive a decision advantage," Lefkowitz explained. This idea applies to all sectors and industries, which "are wearing the same jersey when it comes to staying ahead of the threat."

Cyber-risk and intelligence need to overlap with business decisions, he continued, and the artificial barriers between sectors are beginning to break down. It has taken a long time for information-sharing to catch on, but more businesses are now adopting a "fusion-style" approach to threat intelligence in recognition of the fact they all face the same threats.

"They're realizing intelligence really is table stakes at this point," he noted. Now, those tactical data feeds have an overlay of strategic information aligning with business requirements. These metrics, and a feedback loop, "help keep a scoreboard" and ensures everyone's needs are met.

"What people don't get about the threat landscape is it's less about the [attackers'] techniques and more about the attack surface and the number of openings that have been created," said Art Coviello, executive chairman (retired) of RSA. The key is to have enough data to spot malicious activity. "At some point, the attacker has to do something anomalous," he noted.

"The best place to stop an attack is before it starts," Coviello continued. "The idea is to have enough data that you can analyze in one of those controls that spots the signal and the noise. … At some point, the attacker has to do something anomalous."

As Data Grows, Privacy Fears Abound

"So many people look at the world through a threat lens," said Richard Ford, chief scientist at Forcepoint. "But there's a difference between watching the game and being part of the game."

The level of monitoring accessible with today's technology is great, he added, but people are becoming more aware that better analytics tools come with privacy concerns. The answer is not to choose between privacy and security but figure out how to balance the two.

"We don't have enough of a dialogue around privacy — what it means and how to protect it," he said. "We shouldn't take 'privacy or security,' it's 'privacy and security.'"

Katie Lewin, federal director of the Cloud Security Alliance, echoed this sentiment, noting that privacy is an "up-and-coming issue" in the United States, especially as the European Union prepares to launch the General Data Protection Regulation next month. While she doesn't expect the US will fully adopt GDPR, she does anticipate companies will pay closer attention to privacy as a result.

"There will be a bigger shift in the US in the way in which organizations are looking at personal data," said Cloud Security Alliance CTO Daniele Catteddu. "There is going to be a radical shift in the way compliance, privacy, and security are conceived in organizations."

Threat Intel: An Oversaturated Market

The young and growing threat intelligence space is becoming crowded with companies selling point products, promising to help collect threat data. Instead of offering another monitoring service, some vendors are beginning to add capabilities to unify data across intelligence feeds — one way they can set themselves apart in an increasingly saturated space.

Jaime Blasco, vice president and chief scientist at AlienVault, said he's seeing an "oversaturation of the market" and expects we will see unification in threat intelligence as more businesses try to solve the same problems. Some companies will work together; others will be acquired.

BluVector, which announced intelligence-focused partnerships with Endace and SS8 the week of RSA, is one company exploring these opportunities. The first partnership will combine BluVector's threat detection with Endace's analytics platform; the second will bring together network intelligence with a network security platform for detecting and responding to threats.

A company can use around 70 to 80 tools, said BluVector CEO Kris Lovejoy. To learn about the data they collect, they need to marry threat intelligence with what's happening in the network. "Now, what they're really worried about is [that] they're discovering tools are missing things or catching them, but throwing off false positives," she added.

Brian White, vice president at Forcepoint, also predicted the future will bring consolidation and it's time to think about building systems, not point products. "This is finally the year it feels like [businesses] acknowledge that reality it coming," he said.

Related Content:

Interop ITX 2018

Join Dark Reading LIVE for a two-day Cybersecurity Crash Course at Interop ITX. Learn from the industry’s most knowledgeable IT security experts. Check out the agenda here. Register with Promo Code DR200 and save $200.

Kelly Sheridan is the Staff Editor at Dark Reading, where she focuses on cybersecurity news and analysis. She is a business technology journalist who previously reported for InformationWeek, where she covered Microsoft, and Insurance & Technology, where she covered financial ... View Full Bio

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
conghau115599
50%
50%
conghau115599,
User Rank: Apprentice
4/25/2018 | 4:01:54 AM
Re: BluVector has it right
i gree with you. Thank for your sharing

https://nhakhoahollywood.vn
jigsawsecurity
50%
50%
jigsawsecurity,
User Rank: Apprentice
4/24/2018 | 10:55:45 AM
BluVector has it right
I read the article and I agree that BluVectors concept is the right way to go. As soon as the threat intelligence vendors post IOC data it migrates quickly through all of the vendors. This makes it more costly for threat actors to operate because they have to them migrate their source code to change the ways it is identified (signature based) or moved to new IP's to defeat the blocks. Since 2015 we have stopped using IOC data for active protection so often and concentrated on heuristics to detect threats while continually upgrading our models. If BluVector does this and is successful they will realize that they are finding more targeted malware that was written specifically to target one organization and not the run of the mill infection. I would like to see more vendors heading in that direction. Not only will it make IOC's invalid but we will get closer to protecting real assets without relying on the fact that a piece of malware has been seen before somewhere else. We need more patient zero solutions as an industry. 
Stop Defending Everything
Kevin Kurzawa, Senior Information Security Auditor,  2/12/2020
Small Business Security: 5 Tips on How and Where to Start
Mike Puglia, Chief Strategy Officer at Kaseya,  2/13/2020
5 Common Errors That Allow Attackers to Go Undetected
Matt Middleton-Leal, General Manager and Chief Security Strategist, Netwrix,  2/12/2020
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
6 Emerging Cyber Threats That Enterprises Face in 2020
This Tech Digest gives an in-depth look at six emerging cyber threats that enterprises could face in 2020. Download your copy today!
Flash Poll
How Enterprises Are Developing and Maintaining Secure Applications
How Enterprises Are Developing and Maintaining Secure Applications
The concept of application security is well known, but application security testing and remediation processes remain unbalanced. Most organizations are confident in their approach to AppSec, although others seem to have no approach at all. Read this report to find out more.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2019-20477
PUBLISHED: 2020-02-19
PyYAML 5.1 through 5.1.2 has insufficient restrictions on the load and load_all functions because of a class deserialization issue, e.g., Popen is a class in the subprocess module. NOTE: this issue exists because of an incomplete fix for CVE-2017-18342.
CVE-2019-20478
PUBLISHED: 2020-02-19
In ruamel.yaml through 0.16.7, the load method allows remote code execution if the application calls this method with an untrusted argument. In other words, this issue affects developers who are unaware of the need to use methods such as safe_load in these use cases.
CVE-2011-2054
PUBLISHED: 2020-02-19
A vulnerability in the Cisco ASA that could allow a remote attacker to successfully authenticate using the Cisco AnyConnect VPN client if the Secondary Authentication type is LDAP and the password is left blank, providing the primary credentials are correct. The vulnerabilities is due to improper in...
CVE-2015-0749
PUBLISHED: 2020-02-19
A vulnerability in Cisco Unified Communications Manager could allow an unauthenticated, remote attacker to conduct a cross-site scripting (XSS) attack on the affected software. The vulnerabilities is due to improper input validation of certain parameters passed to the affected software. An attacker ...
CVE-2015-9543
PUBLISHED: 2020-02-19
An issue was discovered in OpenStack Nova before 18.2.4, 19.x before 19.1.0, and 20.x before 20.1.0. It can leak consoleauth tokens into log files. An attacker with read access to the service's logs may obtain tokens used for console access. All Nova setups using novncproxy are affected. This is rel...