Threat Intelligence Starter Resources

Creating a threat intelligence capability can be a challenging undertaking, and not all companies are ready for it. Businesses that run successful threat intelligence teams generally:

•    Collect externally available data on threats and correlate it with internal events.
•    Be aware of threats driving proactive security controls.
•    Establish proactive internal hunting for unidentified threats.
•    Invest in employee and customer threat education.
•    Expand security industry peer relationships.
•    Apply methods for collecting and analysing external threat data.

If your company is just starting out with threat intelligence and doesn’t have the time or resources to dedicate an entire department to the task, there are some easy ways to begin integrating threat intelligence into your daily routine without breaking the bank.

The following resources can help build awareness of the threat landscape and prepare your company for defense.

Google Alerts

One of the simplest ways to stay informed of potential threats is setting up Google Alerts. These can be especially useful to monitor attacks or vulnerabilities in your industry. To get the most from Google Alerts, be sure to follow Google search best practices like keeping phrases as short as possible, using quotes, leveraging domain extensions, and avoiding synonyms.

Threat Feeds

If you want to become more proactive in collecting data there are a number of open source threat feeds you can use to stay informed of suspicious IP addresses and domains as a starting point for threat research. For example, abuse.ch provides many feeds, including a ZeuS block list and ransomware tracker, and dan.me contains a full Tor node list that updates every 30 minutes.

Threat Blogs

Being well read is an important habit in life, and doubly so if you’re tasked with defending your company from cyber threats. Here’s a list of some informative blogs that range from general threat intelligence to incident response to geopolitical attacks:

•    CyberWire: Relevant briefings on critical cyber news happening across the globe.
•    Cyber Security Intelligence: Cyber News, Analyse, Directors, Management Reports and a Cyber Database.
•    OODAloop: Articles and analysis on cyber and geopolitical threats.
•    CTOvision: Context for the CTO, CIO, CISO, and data scientist.
•    FireEye: Insights on today’s advanced threats.
•    CERIAS: Articles from strategic thinkers like Gene Spafford and Sam Liles.
•    Dell SecureWorks: Articles focused on incident response and information security.
•    Palo Alto Networks: Articles and research around cyber-crime and vulnerabilities.
•    DomainTools: Content focused on domain data and internet trends.
•    ProtectedBusiness: Tips and techniques for defending your business.
•    Recorded Future: Original threat research and best practices for using threat intelligence.

Threat Reports

While blog posts can keep you informed on daily threat intelligence, sometimes it is necessary to look at an entire quarter or year to get a full view of the threat landscape.

The following cyber threat reports can help you get a grasp on lessons learned and best practices going forward:

•    Checkpoint Security Report: Yearly insights into cyber threats, including malware and botnets.
•    NTT Global Threat Intelligence Report: Analysis of global attack data.
•    Versign iDefense Cyber Threats and Trends: Overview of key cyber security trends.
•    Cisco Midyear Security Report: Threat intelligence and trend analysis report.
•    Symantec Intelligence Report: Annual and monthly intelligence reports.
•    Verizon Data Breach Investigations Report: Incident data from 67 global contributors.
•    Ponemon Institute Cost of Breach Study: Annual report on economics of breach and recovery.
•    CyberEdge Cyber Threat Report: Summary of security threats, response plans, and processes.

Threat Tools

While staying aware of the threat landscape is critical to any company’s threat intelligence strategy, there are some tools that can supplement the data without breaking the bank:

•    Maltego: Data-mining tool renders directed graphs for link analysis and finds relationships between pieces of information from various sources online.
•    Shodan: Search engine allows you to find out which of your devices are directly connected to the internet, where they are located, and if they are being used maliciously.
•    TweetDeck: Social media dashboard (free) that many use to increase their audience on Twitter, can also help companies track multiple twitter handles and add additional security.

For more information and suggestions on commercial cyber security contact Cyber Security Intelligence Ltd

Recored Future:

You Might Also Read:

Turn Threat Data Into Threat Intelligence:

Artificial Intelligence Gives Business Wings:

 

 

« Germany May Go Offensive After Russian Cyber Attacks
Bank Data Breaches Are Up And It's An Inside Job »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

Cyber Security Supplier Directory

Cyber Security Supplier Directory

Our Supplier Directory lists 6,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

Resecurity

Resecurity

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

Pen Test Partners LLP

Pen Test Partners LLP

Pen Test Partners provides penetration testing, security assessment and training services.

Opscura

Opscura

Opscura (formerly Enigmedia) brings the reliable and cautious hands of operations together with the analytical minds of cyber experts and cryptography researchers.

Adlink Technology

Adlink Technology

ADLINK is a leading provider of embedded computing products and services for applications including IoT and industrial automation.

AKATI Sekurity

AKATI Sekurity

AKATI Sekurity is a security-focused consulting firm providing services specializing in Information Security and Information Forensics.

United Nations Office on Drugs & Crime (UNODC)

United Nations Office on Drugs & Crime (UNODC)

UNODC promotes long-term and sustainable capacity building in the fight against cybercrime through supporting national structures and action.

Data Protection People

Data Protection People

Data Protection People are specialists in Data Privacy, Governance, and Information Security.

Salient Law

Salient Law

Salient Law is a virtual law firm that specialises in advising providers and users of technology on contracts involving technology.

Fudo Security

Fudo Security

Fudo Security is a leading provider of privileged access management and privileged session monitoring solutions.

Unit21

Unit21

Unit21 helps protect businesses against adversaries through a simple API and dashboard for detecting and managing money laundering, fraud, and other sophisticated risks across multiple industries.

NARIS

NARIS

NARIS is the leading provider of an integrated Governance, Risk and Compliance platform called NARIS GRC.

Mitigate Cyber

Mitigate Cyber

Mitigate Cyber (formerly Xyone Cyber Security) offer a range of cyber security solutions, from threat mitigation to penetration testing, training & much more.

Siren

Siren

Siren provides the leading Investigative Intelligence Platform to some of the world’s leading Law Enforcement, National Security and Cyber threat investigators.

Telindus

Telindus

Telindus is the strategic IT partner for the flexible organization of the future. We build optimal IT infrastructure with four components: networking, cloud, cybersecurity and data & AI.

CYBHORUS

CYBHORUS

CYBHORUS are a team of Italian cyber security experts, specialized in cyber threat defense and strategic and organizational consulting.

Indevtech

Indevtech

Indevtech has been serving Hawaii since 2001, providing end-to-end managed IT services to small- and medium-businesses.

Auria

Auria

Auria advances complex space, missile, and cyber operations with visionary solutions and software.