Seven Cyber Intelligence insights for a more secure business

Cyber threat intelligence (CTI) involves the collection, evaluation, verification and distribution of information about ongoing and emerging cyber threats and attacks against network assets and infrastructure. It is becoming increasingly difficult and costly for organizations to defend against cyberattacks on their own. More companies are reaching out to their peers and to other sources for threat intelligence data.

Below are seven Cyber Intelligence insights from the Ponemon Institute’s Third Annual Study on ‘Exchanging Cyber Threat Intelligence: There Has to Be a Better Way’. 1200 IT and cybersecurity practitioners were surveyed in the EMEA and US.

Insight One

The #1 barrier to eff­ective threat intelligence is internal silos among IT departments and lines of business. This finding indicates the importance of a centralized program and tools to make exchange of threat intelligence easier.

Insight Two

60% of enterprises report that their threat intelligence goes stale within minutes. Lack of timeliness makes threat intelligence irrelevant. Only 9% of organizations say they receive threat intelligence in near real time.

Insight Three

45% of enterprises investigate cyber threats manually. This high percentage of manual cyber threat investigation may contribute to the dissatisfaction with the quality of threat intelligence they’re obtaining. Manual threat investigation leads to slower incident response.

Insight Four

Only 31% of organizations say their threat intelligence is actionable. This means that their CTI does not provide enough context for it to be actionable, making it ine­ffective for security operations.

Insight Five

59% of enterprises report that their threat intelligence goes stale within minutes. Lack of timeliness makes threat intelligence irrelevant. Only 9% of organizations say they receive threat intelligence in near real time.

Insight Six

Only 35% of organizations say their cyber threat intelligence is accurate. Lack of accuracy of CTI is among the top three complaints of enterprises about their threat intelligence data. Working with inaccurate data makes it difficult for any team to make the right decisions.

Insight Seven

60% of enterprises are only somewhat satisfied or not satisfied with their cyber threat intelligence. Despite the increase in the exchange and use of threat intelligence, most survey respondents are not satisfied with it. The inability to be actionable, timely and accurate are the most common complaints about their CTI.

There Is a Better Way

Organizations worldwide must foster integrated cybersecurity solutions that enable teams to automate, consolidate, and coordinate the sharing of up-to-date threat intelligence in order to detect cyber threats earlier and remediate them faster and more comprehensively.

Georgina Turner image

Georgina Turner

Sales Manager

Read the Latest Issue

Follow us on X

Follow us on X

Click Here

Follow us on LinkedIn

Follow us on LinkedIn

Click Here

Advertise here

Reach decision makers and amplify your marketing

Advertise here

Click Here

Related News

Graphic displaying a lockdown solution

Netgenium debuts next gen display and touchscreen technologies

Power-over-Ethernet (PoE) solutions specialist Netgenium will be showcasing its new range of IP…

ICT® Launches New TSL Access Reader Series

Integrated Control Technology (ICT®), a leading manufacturer of intelligent access control and…
Image Provided by Paxton

Paxton Partners with Skills for Security

The security technology manufacturer Paxton is proud to announce a partnership with Skills for Security…
Image Provided by ICT

ICT and Ingram Micro sign distribution agreement MEA

Integrated Control Technology (ICT), award-winning global manufacturer of intelligent electronic access control and security solutions..
Image Provided by Toshiba

Toshiba launches new HDD Innovation Lab

Toshiba Electronics Europe GmbH (Toshiba) has inaugurated a new HDD Innovation Laboratory (HDD Innovation Lab) at its site in Düsseldorf..
Image Provided by Verkada

Verkada Doubles Down on the Channel with Strategic New Hire

Verkada, a leader in cloud-based physical security, today announced the appointment of Micah Deriso as Head of Global Channel…
Image Provided by IPSA

IPSA Appoint Frontline Hero as Ambassador

Abdullah, the courageous security officer praised for foiling a horrific knife attack at Leicester Square, has been appointed as…
Image Provided by Codelocks

New Surface Latch from Codelocks

Codelocks is expanding its Gate Solutions by Codelocks range with the introduction of the new Codelocks’ Surface Latch…
Image provided by Genetec

Nicholas Smith to Lead Genetec UK and Ireland Operations

Genetec, provider of enterprise physical security software, announced the appointment of Nicholas Smith as its new Regional Sales Director…

News Desk

View all the latest, product, project and people news

News Desk

Click Here

Technology News

Keep up-to-date with the latest product innovation

Technology News

Click Here

Industry Sectors

Discover technology in action in all applications

Industry Sectors

Click Here

Enter The Awards

Showcase personal or organisation excellence

Advertise With Us

Reach decision makers and amplify your marketing

Advertise With Us

Click Here
Scroll to Top