I have been thinking a lot lately about the accuracy of cyber attack attribution. Most cyber forensic analysts and threat intelligence specialists will tell you that cyber attack attribution done right is a laborious, time-consuming process that is often fraught with multiple dead ends and sometimes requires a leap of faith in the end. The […]
A threat-based cyber defense model is the key to defending your valuable assets in today’s perimeter-less and dynamic environment. Learn about the crucial role that cyber intelligence plays in identifying threats to inform adaptive cyber defenses. Discover products and services that identify, analyze, and track threats so that flexible countermeasures can be prepared to handle them. Find out about the latest research trends and standards for cyber intelligence and threat information sharing. This ACD capability area shows how a deep and continuous understanding of threats at each point in the attack life cycle, gained through the effective use of cyber intelligence, can enable adaptive courses of action to predict, intercept, and mitigate threats.
Intel-Based Defenses and Cyber Intelligence In my last post I talked about the six capability areas that comprise active cyber defense. In this post, I will begin to break down one of the key elements of an ACD capability – i.e., how cyber intelligence and intel-based defenses can enable an adaptive security posture. Take a […]
Sharing Cyber Intelligence Is No Longer An Option The rate of major data breaches across all industry verticals has reached alarming levels. The pace of these attacks is fueled by sophisticated underground marketplaces where exploits are traded and gains are monetized by cyber criminals. In addition, nation-states are making significant investments that are directed to the discovery […]