New Paper: Leveraging Threat Intelligence in Security Monitoring
As we continue our research into the practical uses of threat intelligence (TI), we have documented how TI should change existing security monitoring (SM) processes. In our Leveraging Threat Intelligence in Security Monitoring paper, we go into depth on how to update your security monitoring process to integrate malware analysis and threat intelligence. Updating our process maps demonstrates that we donât consider TI a flash in the pan â it is a key aspect of detecting advanced adversaries as we move forward. Here is our updated process map for TI+SM.: As much as you probably dislike thinking about other organizations being compromised, this provides a learning opportunity. An excerpt from the paper explains in more detail: There are many different types of threat intelligence feeds and many ways to apply the technology â both to increase the effectiveness of alerting and to implement preemptive workarounds based on likely attacks observed on other networks. Thatâs why we say threat intelligence enables you to benefit from the misfortune of others. By understanding attack patterns and other nuggets of information gleaned from attacks on other organizations, you can be better prepared when they come for you. And they will be coming for you â letâs be clear about that. So check out the paper and figure out how your processes need to evolve, both to keep pace with your adversaries, and to take advantage of all the resources now available to keep your defenses current. We would like to thank Norse Corporation for licensing this paper. Without support from our clients, you wouldnât be able to use our research without paying for it. You can check out the permanent landing page for the paper, or download it directly (PDF). Share: