Cyber threat intelligence
identify dangers before they cause damage
Find threats before they become a problem
Advantages of Cyber Threat Intelligence
34% less time spent by the security team on reporting
Fast location of threats
Up to 10x faster in identifying a threat.
Detected threats are suppressed faster .
The life cycle of Threat Intelligence
1. Planning and direction
The first step is to ask the right question to guide the creation of actionable information about potential threats.
The next step is to collect raw data that meets the requirements established in the first phase.
Once all the raw data has been collected, it needs to be organized with metadata, filtering out redundant information or false positives and negatives.
The goal of the analysis is to search for potential security issues and notify relevant teams as defined in the first planning phase.
For intelligence about threats to be usable, it needs to reach the right people.
After receiving the finished intelligence product, the initiator reviews it and determines if their questions have been answered.
Cyber Threat Hunter (wanted)
Cyber Threat Intelligence in practice
What could be found thanks to the OSINT
- Stolen credentials
- Documents on display
- Source Code Leak
- Systems that have been Data Breached
- Phishing sites linked to the company name
- Fake accounts in Social Networks
- Unsolicited Vulnerability Reports
- Trademark infringements
- Domain names occupied
Contact us for more information
Estimated reading time: 8 minutes Il termine shoulder surfing potrebbe evocare immagini di un piccolo surfista su… https://t.co/PKEpO1Mvzn
Ten years ago, on June 16, 2011, Secure Online Desktop was born. Many things have changed in ten years and we have… https://t.co/DN23n6BK7q
Dieci anni fa, il 16 giugno del 2011, nasceva Secure Online Desktop. Sono cambiate moltissime cose in dieci anni e… https://t.co/H7TPlWJ5Pk
Estimated reading time: 8 minutes The term shoulder surfing might conjure up images of a little surfer on his… https://t.co/3poUTq9MUc
Estimated reading time: 5 minutes I ricercatori della sicurezza hanno appena digerito il protocollo HTTP/2, ma gl… https://t.co/XsFsgBTpia