Seven Cyber Intelligence insights for a more secure business

Cyber threat intelligence (CTI) involves the collection, evaluation, verification and distribution of information about ongoing and emerging cyber threats and attacks against network assets and infrastructure. It is becoming increasingly difficult and costly for organizations to defend against cyberattacks on their own. More companies are reaching out to their peers and to other sources for threat intelligence data.

Below are seven Cyber Intelligence insights from the Ponemon Institute’s Third Annual Study on ‘Exchanging Cyber Threat Intelligence: There Has to Be a Better Way’. 1200 IT and cybersecurity practitioners were surveyed in the EMEA and US.

Insight One

The #1 barrier to eff­ective threat intelligence is internal silos among IT departments and lines of business. This finding indicates the importance of a centralized program and tools to make exchange of threat intelligence easier.

Insight Two

60% of enterprises report that their threat intelligence goes stale within minutes. Lack of timeliness makes threat intelligence irrelevant. Only 9% of organizations say they receive threat intelligence in near real time.

Insight Three

45% of enterprises investigate cyber threats manually. This high percentage of manual cyber threat investigation may contribute to the dissatisfaction with the quality of threat intelligence they’re obtaining. Manual threat investigation leads to slower incident response.

Insight Four

Only 31% of organizations say their threat intelligence is actionable. This means that their CTI does not provide enough context for it to be actionable, making it ine­ffective for security operations.

Insight Five

59% of enterprises report that their threat intelligence goes stale within minutes. Lack of timeliness makes threat intelligence irrelevant. Only 9% of organizations say they receive threat intelligence in near real time.

Insight Six

Only 35% of organizations say their cyber threat intelligence is accurate. Lack of accuracy of CTI is among the top three complaints of enterprises about their threat intelligence data. Working with inaccurate data makes it difficult for any team to make the right decisions.

Insight Seven

60% of enterprises are only somewhat satisfied or not satisfied with their cyber threat intelligence. Despite the increase in the exchange and use of threat intelligence, most survey respondents are not satisfied with it. The inability to be actionable, timely and accurate are the most common complaints about their CTI.

There Is a Better Way

Organizations worldwide must foster integrated cybersecurity solutions that enable teams to automate, consolidate, and coordinate the sharing of up-to-date threat intelligence in order to detect cyber threats earlier and remediate them faster and more comprehensively.

About Security Buyer

Security Buyer is the leading authority in global security content, delivering expert news, in-depth articles, exclusive interviews, and industry insights across print, digital, and event platforms. Published 10 times a year, the magazine is a trusted resource for professionals seeking updates and analysis on the latest developments in the security sector.

To submit an article, or for sponsorship opportunities, please contact our team below.

Rebecca Spayne picture 2025

Rebecca Spayne

Managing
EDITOR

Georgina Turner image

Georgina Turner

Sales
Manager

Afua Akoto image - Security Buyer

Afua Akoto

Marketing Manager

Read the Latest Issue

Follow us on X

Follow us on X

Click Here

Follow us on LinkedIn

Follow us on LinkedIn

Click Here

Advertise here

Reach decision makers and amplify your marketing

Advertise here

Click Here

Related News

Sophos

Sophos Enhances Protection and Incident Response

Sophos announces an update to its Sophos Firewall, now including Sophos NDR Essential, which is free for all customers with an…
Image provided by SentinelOne

SentinelOne to Spotlight AI-Power at GISEC 2025

SentinelOne announces its participation at GISEC Global 2025 (6-8 May) at the Dubai World Trade Centre. The company will highlight..
Two young intercultural programmers trying to solve problem with access to data while interacting in front of computers

DDoS attacks targeting critical infrastructure

NETSCOUT released its 2H2024 DDoS Threat Intelligence Report, revealing how Distributed Denial of Service (DDoS)…
Copyright: Security Buyer

ASIS UK Launches “Security is You(th)” Hackathon

ASIS International UK has launched Security is You(th), an initiative designed to engage students and early-career professionals…
BeyondTrust

Into the Cloud – Morey J. Haber, BeyondTrust

The January edition of International Security Buyer featured Morey J Haber, Chief Security Advisor for BeyondTrust in our Into the Cloud…
Riham Security website

Growing Intersec Saudi Arabia

Intersec Saudi Arabia’s Event Director, Riham Sedik, discusses the event’s future growth and government partnerships

Neustar Security Services introduces UltraPlatform

Neustar Security Services, a provider of cloud-based security services that enable businesses to thrive online, is launching UltraPlatform.

Security and fire 2023 trends

In 2023 all industries will face several challenges: sustainability, cost increases, and how to better manage energy & resources.
istorage

Zero trust, maximum caution

John Michael, CEO, iStorage considers the dangerous new ‘golden age’ of ransomware, ways businesses can neutralise..

LAPSUS$ exposes cyber gaps in organisations

The LAPSUS$ group exploded onto the cyber scene late last year after successfully breaching major companies.
Scroll to Top