Why threat intelligence plays a vital role in modern cybersecurity strategies

Emad Fahmy, Systems Engineering Manager, Middle East, NETSCOUT, explains how threat intelligence helps enterprises defend against today’s sophisticated cyber-attacks.

Cyberattacks and data breaches continue to escalate, reaching record levels. In fact, Forbes reports that the number of data breaches in 2021 has already exceeded 2020. Forbes cites a study claiming that the 1,111 data breaches detected so far this year surpasses the total number of data compromises from all causes in 2020.

With cyberattacks increasing and breaches making headlines, IT security teams are faced with the reality that existing tools are simply no match for this growing threat. To make matters worse, as the risk rises, so does the cost of combatting the threats and the potential losses from compromised businesses.

According to a 2021 survey by PwC, cybersecurity is a growing concern for organisations, with approximately 43% of Middle East CEOs planning to increase investments in cybersecurity and data privacy by 10% or more over the next three years. Moreover, 41% of these leaders think that their organisation should be doing more to measure cybersecurity. The ever-evolving threat environment has made it increasingly necessary to be vigilant.

A significant shortcoming of many of today’s cybersecurity tools is that the typical data sets feeding them are reactive, not granular, and do not extend to the earliest indications of a potential attack. This makes it difficult to identify threats early in the attack lifecycle. As a result, security professionals are not armed with the information to prevent infections from spreading, identify compromised assets, or stop future attacks.

How threat intelligence helps
Companies that do business on the internet or use network connections in any shape or form are vulnerable to cyberattacks. According to the 1H 2021 NETSCOUT Threat Intelligence Report, there were nearly 5.4 million distributed denial-of-service (DDoS) attacks in the first half of 2021.

However, while the threat landscape is often discussed in terms of attack numbers, experts in threat intelligence tend to think in terms of people: the adversaries behind the attacks.

When it comes to combatting distributed denial-of-service (DDoS) and ransomware attacks, threat intelligence is vital. Threat intelligence is the study of the bad actors who perpetrate these attacks, along with the tactics and tools they use. This involves unveiling the bad actor’s attack methodologies and why they are targeting those victims. This knowledge is then turned into actionable insight that enterprises can access and comprehend. Empowered with this knowledge, enterprises can learn about their network’s vulnerabilities to actively defend against threats. That actionable insight is crucial for defending against DDoS attacks. There were more than 10 million DDoS attacks in 2020 alone, and that record-setting pace continued into 2021.

Defending against sophisticated attacks
One new form of attack that is recently on the rise is DDoS extortion. In these cases, the attacker launches a demonstration attack against the victim and then follows up with an extortion demand. This demand typically states that the attacker has a lot more DDoS capacity and will direct that capacity at the victim if the extortion payment isn’t made. Indeed, respondents to the 16th annual Worldwide Infrastructure Security Report (WISR) reported a 125% increase in such attacks.

Moreover, bad actors are using triple extortion tactics, combining data encryption, data exfiltration, and DDoS attacks to create a three-pronged attack that increases the likelihood of the victim complying with the ransom demand.

In today’s increasingly fraught threat landscape, organisations must be prepared to defend themselves. This requires having a plan in place, successfully executing that plan, and regularly evaluating the plan’s effectiveness to strengthen it against subsequent attacks. The good news is, preparation pays off.

Ultimately, the fundamental aspect of DDoS defense is knowing the network. When it comes down to defending an organisation, a lot of it will come down to knowing what their services look like and what they depend on and then using practical solutions to fine-tune the correct level of defense. Threat intelligence is essentially a way of testing defenses protection so that enterprises can enhance them.

 

 

Media contact

Rebecca Morpeth Spayne,
Editor, Security Portfolio

Tel: +44 (0) 1622 823 920
Email: [email protected]

About Security Buyer

Security Buyer is the leading authority in global security content, delivering expert news, in-depth articles, exclusive interviews, and industry insights across print, digital, and event platforms. Published 10 times a year, the magazine is a trusted resource for professionals seeking updates and analysis on the latest developments in the security sector.

To submit an article, or for sponsorship opportunities, please contact our team below.

Rebecca Spayne picture 2025

Rebecca Spayne

Managing
EDITOR

Georgina Turner image

Georgina Turner

Sales
Manager

Afua Akoto image - Security Buyer

Afua Akoto

Marketing Manager

Read the Latest Issue

Follow us on X

Follow us on X

Click Here

Follow us on LinkedIn

Follow us on LinkedIn

Click Here

Advertise here

Reach decision makers and amplify your marketing

Advertise here

Click Here

Related News

Mike Hurst - Security Buyer

Zygal appoints Mike Hurst CPP CPOI

Zygal, which produces cutting edge AI cloud VMS and monitoring solutions for connecting, managing, and monitoring assets…
Secure Logiq

Secure Logiq expands into APAC

Secure Logiq is heading into the Asia-Pacific region with big plans and a clear focus on Australia and New Zealand. Helping to steer…
Sophos

Sophos Enhances Protection and Incident Response

Sophos announces an update to its Sophos Firewall, now including Sophos NDR Essential, which is free for all customers with an…
Dallmeier

Tenerife Airport relies on video technology

Tenerife Norte-Ciudad de La Laguna Airporthas significantly improved its safety by installing state-of-the-art video technology..
ICT

ICT announces Stewart Meyer as Chief Marketing Officer

Integrated Control Technology (ICT®), a leading provider of intelligent access control, intrusion detection, building automation and…
IDIS

IDIS launches Edge AI Plus Camera Range

IDIS’s new Edge AI Plus Camera range gives users more flexible, affordable options to upgrade their video systems with advanced AI…
OneLink

Product Spotlight – Gallagher’s OneLink

Gallagher Security presents, OneLink – the product that is elevating remote security through the power of the cloud 
Pinaccle systems

Pinnacle Systems further supports Installers and System Integrators

Pinnacle Systems has launched the Pinnacle Partner Programme, a new initiative designed to provide enhanced support for installers…
Stephen Tickle

Comelit-PAC Appoints Stephen Tickle as Regional Sales Manager

Comelit-PAC has appointed Stephen Tickle as its new Regional Sales Manager.  Stephen will focus on supporting PAC’s access control…
Intersec Saudi

Intersec Saudi Arabia returns with record exhibition space

Intersec Saudi Arabia, the premier industry platform for security, safety and fire protection, will return to the Riyadh…
Scroll to Top