This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them. Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.
Jan 05, 2015
It's always difficult to get a true picture of the state of enterprise security. Most CSOs cannot, or will not, discuss their own experiences in any detail. One thing we do know is that BYOD, social media, and the cloud have significantly increased network complexity and vulnerability, as the latest attacks often leverage these vectors to bypass traditional security defenses, including firewalls, anti-malware, intrusion detection, and user authentication systems. While these technologies are necessary to mitigate the majority of common threats, security teams need to be able to quickly adapt defenses as the threat landscape evolves.
How? One of the fastest-growing segments of the security industry is threat intelligence services that collect information about potential external cyberthreats and feed it to your organization on a regular basis.
Dark Reading's 2014 Threat Intelligence Survey reveals the extent to which third-party threat intelligence is already being used by enterprises in the battle to keep business and client data secure. Sixty-six percent of respondents say they use it regularly to guide IT security strategies, with 60% of those security pros saying it plays a vital role, even shaping their entire security strategies.
Still, given that the majority of respondents say they have yet to fully realize the benefits of analyzing their own internally generated data, is third-party threat intel just an overhyped, passing fad? Or can it really help to develop a more effective cyber defense strategy? We'll explore.