Turn Threat Data Into Threat Intelligence

Threat intelligence has now been a favorite of the information security industry now for some time.

It is a powerful concept, let someone else deal with an attack or exposure, and use their experience to prevent the same problem in your organization. Since there are free sources for a tremendous amount of such data, it seems like a great deal.

The great deal is not always as good as it seems, however. Threat intelligence information is quite often wrong or misleading. As has been mentioned, "These are the threats that keep me awake at night," a Vermont electric utility, responding to intelligence information in a US government joint forces statement, called in the FBI to investigate what turned out to be an employee’s innocent attempt to read their email on Yahoo.

Unvetted threat intel is a bit like getting raw data feeds about the stock market. Responding to such data, you may be the next investment millionaire, or you could completely lose your shirt. You need to filter through it to eliminate the useless portions, and carefully weigh the balance.

As Malcovery Security said in a blog some months ago, most of what the industry refers to as threat intelligence is really just threat data. It is just a list of data elements, full of noise and false positives. Until the intelligence part is applied to this data feed, it is fairly useless, or even worse, may lead to false conclusions.

According to Mark Orlando in his presentation to the RSA Security Conference in 2015, raw threat intel data is highly commoditized, has poor quality control, a short shelf life, and promotes a false sense of awareness.

So, with so many negatives about threat intel, why does anyone bother?

The answer is simple, threat intel data properly filtered, vetted, and reviewed by a team with appropriate skills and experience can be of greater value than any other security tool in our arsenal. The operational security team at a large medical organization I work with has been able regularly to use a number of threat intel data points to identify active but unknown threats and vulnerabilities.

The following are some ideas to help turn threat data into true threat intelligence:

Get the right people looking at it

Much of the value from threat intel data results from its review by qualified and experienced professionals, who have learned by experience what to ignore, and what to focus on.

Make it industry specific

In the past few years, many information security threats have often been stratified by industry. While some threats are strictly random, many are targeted to a specific area of business. As an example, the medical industry has experienced a number of targeted ransomware threats in recent months. We can take advantage of this stratification by seeking sources of intelligence data specific to our industry. This approach accomplishes much of the necessary filtering up front. Organisations exist for many industries that can provide some of this intelligence.

Keep it timely

Unlike the early days in information security, where the casual hacker ruled, we now deal with sophisticated and adaptable professional criminals. Typically, as soon as they recognize that their campaigns have been discovered, they quickly pivot their attacks. As such, dated threat intel information is, if you will excuse the expression, so last week. To properly use threat data, stay focused on reviewing and acting on it shortly after receipt.

Use realizable sources

Coming off of a contentious elections season, we have all learned the term "fake news," with certain news outlets seeming to have more reliable news items than others. The same distinction applies to threat intelligence. There are good sources and bad ones, and it is not always obvious which is which. It takes careful observation over a period of time to learn what sources you can rely on, and which you would be better off without.

Review it against your activities in your environment

Threat data is especially useful when you can apply it against recent activity data from your own organization. If someone in your industry reports that a bad actor is using a particular exploit, reviewing it against your organisation's recent activity can quickly help you discover that the same exploit is being used against you. This approach does require a centralised repository of log information from across your company. Log consolidation systems such as Splunk, include features that allow you to import threat intel data, and quickly review it against your recent activity.

Automate it

Taking the above comparison to logs of your recent activities one step further, it is often possible to automate the receipt and processing of threat data, such that an alert is generated when a high value match has been found.

Stay on top of it

It is easy to get mired in a large amount of inbound data. Recognise its potential value, and stay with it. Constantly refine your processes so that you can use the data more effectively with fewer man hours.

The bottom line? Threat intelligence data can be your best friend, or can use up all of your free time to no avail. It is a great tool, but you must learn to use it effectively in a way that supports your environment.

Computerworld

 

« Facebook’s Shifting Attitude To Controversy
Technology Will Demolish Slow Internet Speeds »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Cyber Security Supplier Directory

Cyber Security Supplier Directory

Our Supplier Directory lists 6,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

Bishop Fox

Bishop Fox

Bishop Fox is a leading authority in offensive security, providing solutions ranging from continuous penetration testing and attack surface management to product and application security assessments.

Coalfire

Coalfire

Coalfire specialises in cyber risk management and compliance. Our services span the cybersecurity lifecycle from advisory and compliance, to testing and engineering, monitoring and optimization.

Norton Rose Fulbright

Norton Rose Fulbright

Norton Rose Fulbright is a global business law firm. Practice areas include Data protection, Privacy and Cybersecurity.

Institute for Cybersecurity & Privacy (ICSP) -  University of Georgia

Institute for Cybersecurity & Privacy (ICSP) - University of Georgia

The goal of ICSP is to become a state hub for cybersecurity research and education, including multidisciplinary programs and research opportunities, outreach activities, and industry partnership.

Plurilock Security Solutions

Plurilock Security Solutions

Plurilock is a real-time cybersecurity solution that uses artificial intelligence to identify, prevent, and eliminate insider threats.

Pixalate

Pixalate

Pixalate is an omni-channel fraud intelligence company that works with brands and platforms to prevent invalid traffic and improve ad inventory quality.

US-Africa Cybersecurity Group (USAFCG)

US-Africa Cybersecurity Group (USAFCG)

USAFCG provides cybersecurity consulting services and delivers training programs for capacity building in Africa.

drie

drie

drie is an end-to-end cloud services company based in Bahrain, Dubai and London. We enable businesses to adopt, scale on and build for cloud.

InfoSec Conferences

InfoSec Conferences

InfoSec Conferences is an online directory of infosec conferences. We list every single Information Security conference, event and seminar within every niche in Cybersecurity.

CerraCap Ventures

CerraCap Ventures

CerraCap Ventures invest globally into early-stage B2B companies in Healthcare, Enterprise AI and Cyber Security.

NetBlocks

NetBlocks

NetBlocks is a global internet monitor working at the intersection of digital rights, cyber-security and internet governance.

Bugv

Bugv

Bugv is a crowdsourcing cybersecurity platform powered by human intelligence where we connect businesses with cyber security experts, ethical hackers, bug bounty hunters from all around the world.

HashDit

HashDit

HashDit products and services focus on helping build a safe ecosystem for both protocol users and smart contract developers on BNB Chain.

NetApp

NetApp

The NetApp portfolio includes intelligent cloud services, data services, and storage infrastructure that helps organizations manage applications and data everywhere across hybrid cloud environments.

Smarsh

Smarsh

Smarsh products are designed for user-friendly, efficient compliance. From archiving, supervision, and discovery to cybersecurity – Smarsh has you covered.

IT.ie

IT.ie

IT.ie are a comprehensive provider of Managed IT Services, Cloud Solutions, Cyber Security, and proactive IT support services.