The Difference Between Threat Intelligence and Random Information

Some vendors offer Threat Intelligence by monitoring information about you on the surface and dark web for an annual fee. This sounds good on the surface but what are they really doing for you? Do you ever see any evidence other than their summary report? Are you truly getting your money's worth? Are you able to do anything with the information they offer?

Unless you ask the right questions, define a clear contract, or a proper report, a company could be wasting a considerable sum of money. Here's why.

Threat Intelligence should consist of recorded information compiled by combing, scraping, monitoring the surface and dark web, recording discovered exploits, potential vulnerabilities, and information that can be used by a threat actor against a domain. Unfortunately, one key metric missing more often than not are indicators of compromise (IOC) - hashes that can be added to endpoint protection, domains/IP addresses that can blocked, and other vectors that can be blocked or filtered.

There's also one other key metric that is forgotten; providing qualified and verified information. A threat intelligence vendor can provide all the information and IOCs in a fancy briefing. It is nothing more than subjective information. Subjective information has a tendency to create hassles and incidents rather than mitigate risks and eliminate threats. For example, some vendors report the same emails/accounts over and over without validation. This results in unnecessary incident response, wasted hours and resources.

If all you get is an empty summary of something that happened some place to someone somewhere, or if the information gathered cannot be verified as accurate and reliable, then it cannot be qualified and therefore is not actionable, viable threat intelligence.

Actionable threat intelligence provides useful information that enables improving defenses, not waste money.

Its baffling how much garbage is portrayed as Threat Intelligence... for the most part I view threat intelligence as a marketing scheme. It gets slightly better when its not used as a marketing tactic, but still not great.

To view or add a comment, sign in

More articles by Eric Garay

  • Elevated Security: End of Life Visibility

    Information security vendors tend to think there's no value in supporting end of life (EOL) operating systems. For…

  • Starting in Cyber Security

    How do I get started in cyber security? This is a common question I hear from people new to the career or that haven't…

    1 Comment
  • Analyzing Email Headers

    What's the purpose of analyzing email headers? May be you're trying to identify an actual sender, block a malicious…

  • Preventing Phishing

    What is phishing? It's a social engineering tactic used to create something that looks legitimate in order to acquire…

  • Is Your Threat Intelligence Service Worth Its Weight in Gold?

    Recently, there are been a new Experian commercial where they claim they can protect you by monitoring information…

  • What Makes a Good SIEM?

    A professional colleague asked this question one afternoon. His small business had grown to become a sizable medium…

  • So You Want to Build a SOC?

    A Security Operations Center (SOC) by definition is essentially a centralized location where a Cyber Security team…

  • Cyber Security Students Seeking Opportunities

    Many aspiring Cyber Security students ask what can they do to attract the attention of companies and recruiters…

    1 Comment
  • Mergers and Vulnerabilities

    Change is an inevitable occurrence of any large enterprise network. Businesses divest and merge with the seasons.

Others also viewed

Explore content categories