var _hmt = _hmt || []; (function() { var hm = document.createElement("script"); hm.src = "https://hm.baidu.com/hm.js?d387e539c1f2d34f09a9afbac8032280"; var s = document.getElementsByTagName("script")[0]; s.parentNode.insertBefore(hm, s); })();

Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Threat Intelligence

12/2/2019
10:00 AM
Anton Chuvakin
Anton Chuvakin
Commentary
Connect Directly
50%
50%

3 Modern Myths of Threat Intelligence

More intelligence does not lead to more security. Here's why.

There's no shortage of news about data breaches. In the first three quarters of 2019, we've seen reports of , exposing more than 160 million records from companies ranging from banks and hospitals to social media sites and restaurants.

7x彩票网appAdmittedly, most security articles in the last decade or so can be started with a similar statistic. However, such headlines are more troubling today given the increase in security investments over the past few years.

They also tell an important story: We've yet to determine the best method for learning about threats, acting against them, and then securing our systems against future attacks. While many security professionals agree in principle that "know your enemy" is important, few actually put it into practice.

I saw often during my eight years as a security analyst. Organizations have the intelligence, but not the ability to use it to further their goals. I continue to see the same issues and misconceptions when it comes to threat intelligence. Here are three common threat intelligence myths that are preventing organizations from reaching their full security potential.

Myth 1: It's easy to use threat intelligence to prevent threats.
I've seen security teams try to incorporate intelligence into preventative controls, but many of these controls are inherently static and don't effectively address intelligence uncertainties. Making an otherwise static preventative control more agile often presents an unsolvable challenge. On the other hand, security teams can and should use threat intelligence in detection and visibility controls because it allows you to make rapid adjustments. To use an imperfect analogy, it is easier to turn your spotlight or a magnifying glass on a new object than to build a concrete wall around it.

Static defenses can, in some cases, work rather well in prevention. For example, application whitelisting or network access controls contribute to security without any awareness of threat actors. You can also try using threat intel data in an IP or hash block list, with mixed results.

However, these are minimal-value use cases of threat intelligence, and some would even say that IP and hash block lists are not even true threat intelligence. Leveraging threat intelligence implies a degree of agility, which is often wasted by the teams that rely heavily on these static defenses. You are likely to contribute more to your security when you use threat intelligence for detection, alert triage, and incident response versus blindly trying to play "whack-a-mole" with an unknown attacker.

Myth 2: The more threat intelligence you collect the more secure you are.
7x彩票网app Many organizations don't know how to gain value from threat intelligence, and intelligence — cyber or not — doesn't help people who aren't willing to help themselves. If someone tells you that thieves are planning to rob your house tonight, what steps would you take to try to prevent it? You could lock the doors, hide your valuables, and maybe stay at a friend's house. However, none of that would guarantee that the crime wouldn't happen.

I've noticed that organizations don't truly understand what it means to be "agile" when acting on threat intelligence. In my experience, an agile security team rapidly operationalizes and incorporates intelligence into detection processes, and deploys tools that work quickly to deliver detection. If you learn that a group is planning to hack your systems using a certain method, but you can't adjust your infrastructure or existing controls to defend against that method, intelligence is wasted. You are only as secure as the next steps you take after learning about a threat — and if you take them in the time you have before it hits.

7x彩票网appI once heard about a company that learned that its e-commerce website was on the verge of an attack. Since it couldn't contact a new hosting provider overnight or make changes to their configurations, the company had no way to defend itself. Ultimately, it took nearly the same loss as it would have if it didn't even know the attack is coming. What would have been more effective: if the security team quickly made direct changes to the hosting provider configuration or the website itself.

Myth 3: Everybody needs threat intelligence.
7x彩票网app While threat intelligence can be sexy, security operations processes can't become "intelligence-aware" overnight. In fact, a drive for more intelligence can often be a distraction for security teams, especially when such intelligence is not operationalized. In these cases, the organizations would be better off focusing on security measures such as removing administrative rights and application whitelisting, and others that work effectively in near-complete absence of threat intelligence.

It is much easier to hook up new threat intelligence data feeds than to accelerate the change management process to help the organization quickly find an affected asset. However, more intelligence does not lead to more security, and there is an opportunity cost to an "intelligence pack-rat approach."

Related Content:

Check out The Edge, Dark Reading's new section for features, threat data, and in-depth perspectives. Today's top story: "In the Market for a MSSP? Ask These Questions First"

Anton is a recognized security expert in the field of log management, SIEM and PCI DSS compliance. He is the author of several books and serves on advisory boards of several security startups. Before joining Chronicle, Anton was a research vice president and Distinguished ... View Full Bio
Comment  | 
Print  | 
More Insights
Webcasts
More Webcasts
Reports
More Reports
Comments
Newest First  |  Oldest First  |  Threaded View
50%
50%
fredluis,
User Rank: Apprentice
1/7/2020 | 8:57:04 PM
FredLuis
Thanks for the information on this. I really enjoy the write up 
50%
50%
FortWorthPro,
User Rank: Apprentice
12/31/2019 | 9:41:38 PM
Re: 3 Modern Myths of Threat Intelligence
I agree with Joshua this was very informative and exactly what I was looking for. So surprised I never heard of this website until today. I guess because I'm always under a stove doing Fort Worth appliance repair services but I'll make sure to come back and read more articles when I have time after the New Years. 
50%
50%
joshuaprice153,
User Rank: Apprentice
12/11/2019 | 1:31:00 AM
3 Modern Myths of Threat Intelligence
This guide is so helpful and informative. You also added tips which is like a bonus to an already great article.
Why Companies Should Care about Data Privacy Day
Brad Shimmin, Distinguished Analyst,  1/29/2020
Greater Focus on Privacy Pays Off for Firms
Robert Lemos, Contributing Writer,  1/27/2020
Average Ransomware Payments More Than Doubled in Q4 2019
Jai Vijayan, Contributing Writer,  1/27/2020
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Current Issue
IT 2020: A Look Ahead
Are you ready for the critical changes that will occur in 2020? We've compiled editor insights from the best of our network (Dark Reading, Data Center Knowledge, InformationWeek, ITPro Today and Network Computing) to deliver to you a look at the trends, technologies, and threats that are emerging in the coming year. Download it today!
Flash Poll
Organizations have invested in a sweeping array of security technologies to address challenges associated with the growing number of cybersecurity attacks. However, the complexity involved in managing these technologies is emerging as a major problem. Read this report to find out what your peers biggest security challenges are and the technologies they are using to address them.
7x彩票网app Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database

PUBLISHED: 2020-02-01
DrayTek Vigor2960 1.3.1_Beta; Vigor3900 1.4.4_Beta; and Vigor300B 1.3.3_Beta, 1.4.2.1_Beta, and 1.4.4_Beta devices allow remote code execution as root (without authentication) via shell metacharacters to the cgi-bin/mainfunction.cgi URI.

PUBLISHED: 2020-02-01
In IceWarp Webmail Server through 11.4.4.1, there is XSS in the /webmail/ color parameter.

PUBLISHED: 2020-01-31
Unrestricted file upload vulnerability in an unspecified third party tool in United Planet Intrexx Professional before 5.2 Online Update 0905 and 6.x before 6.0 Online Update 10 allows remote attackers to execute arbitrary code by uploading a file with an executable extension, then accessing it via ...

PUBLISHED: 2020-01-31
Heap-based buffer overflow in the getZip64Data function in Info-ZIP UnZip 6.0 and earlier allows remote attackers to execute arbitrary code via a crafted zip file in the -t command argument to the unzip command.

PUBLISHED: 2020-01-31
School Management Software PHP/mySQL through 2019-03-14 allows office_admin/?action=addadmin CSRF to add an administrative user.
66?????? 7072???? 7073???? 689????? 963???? 66????? 7073???? 7073???? 66???app 8????app