The last thing that any organization wants is to make the headlines following a security breach. The damage to their reputation can be enormous, as can the financial costs. Unfortunately, it’s not a case of if it will happen, but when it will happen. Credit: Thinkstock Do you know the difference between information and intelligence? While this may seem nothing more than semantics in most situations, the difference is extremely significant when it comes to cyber security. Simply described, information is data or facts that have been collected and intelligence is actionable assessment of those facts.The distinction can be best illustrated as follows:InformationAn exploit for a zero-day Java vulnerability is publicly released on a security mailing list. Shortly thereafter, malware is identified using the vulnerability. Security vendors notify clients of this threat and provide recommendations for mitigation. This is threat information and, while useful, it is not, by definition, threat intelligence.IntelligenceA security vendor monitoring exploitation of the Java vulnerability notices that infection rates in Asia are much higher than in the US. New strains of malware, which install code associated with a botnet command and control system on victim devices, are being observed in the wild. At the same time, a large financial institution has announced the acquisition of several smaller, regional banks initiating an increase in their non-sufficient funds fee from $20 to $35, thereby angering consumers. Many hacktivist groups begin discussing a protest against the US banking system on social media sites, promising to halt online transactions for a day at major institutions. One hacktivist Twitter account posts instructions for using botnet command and control software, which appears to be related to the botnet client code installed by a recently identified Java malware. Piecing these data points together leads to a clearer picture – US banks are likely going to be targeted with a DDoS attack by a hacktivist group using botnets based on the Java vulnerability. Based on what is known about infection profiles, banks can expect the attacks to originate from Asian source IP addresses. This is threat intelligence – information gathered from several disparate sources, synthesized by human analysts to identify a specific threat to a specific target.Recent headlines suggest that organizations today are not equipped to perform such highly intricate and complex analysis and, as a result, attackers appear to be winning the war. This is not to say that there is no use for security intelligence tools that can alert and respond when indicators are identified – but they are limited in capability for turning that information into actionable intelligence. Rather, threat intelligence platforms offered by managed security services providers are automating the identification and analysis of the data, so organizations can take the necessary and immediate steps to thwart the intruders. Threat intelligence management technology is seeing significant growth across a broad range of users and, as recent hacks will attest, for good reason. It’s a reliable and cost-effective method for improving network security through proactive mitigation of potential threats. The technology is devised to understand, analyze, curate, and enrich threat information using advanced analysis techniques and proprietary tools. The supporting underlying infrastructure can collect and store massive amounts of information and make it available for curation, enrichment, automated correlation and processing, as well as enabling manual threat analysis and research.While increased cyber threats have accelerated the need for threat intelligence services, businesses need to be aware of the different types of intelligence being delivered by the security industry. Is it intelligence resulting from the automated collection and analysis of data obtained from sources such as social network monitoring, spam traps, malware reversing and observation, live botnet connections and so on; or, is the intelligence derived from a blend of these sources along with more human analysis that can add a further level of intelligence? For instance, observation of a malware infection could offer insights into what the intruder does once inside the network or what specifically they are looking for. Instructive intelligence can also be gained from past responses.The last thing that any organization wants is to make the headlines following a security breach. The damage to their reputation can be enormous, as can the financial costs. Unfortunately, it’s not a case of if it will happen, but when it will happen. So, it is essential to have threat intelligence capable of providing a comprehensive and real-time view of the threat. Human interactions, along with automated tools that identify emerging threats for scope and impact; effect attribution to known actors, techniques, tactics and procedures; curate known threats and when? They evolve; and, provide validated indicators of compromise (IOC) which offer a higher level of threat intelligence that can be used to enact countermeasures that guard against current and future vulnerabilities and intruders. Related content opinion How to prepare for the next cybersecurity attack How should security management ready their organizations? By Christopher Camejo Mar 07, 2018 5 mins Risk Management Security opinion Vetting third-party IT security partners In the last installment of this blog series, “Report from the Field – CISO’s Top Concerns,” we discuss the benefits and risks of using third-party service suppliers. By John Petrie Jan 03, 2018 4 mins Security opinion Sophistication of cyberthreats – combination of independent hacker organizations and state actors In the same way network security tools are developed and released, cyber criminals can pick up a wide inventory of tools that can make it easy for those who don’t have a technical background to launch a cyberattack. By John Petrie Nov 28, 2017 4 mins Technology Industry Hacking Cybercrime opinion Dealing with a shortage of information security and IT skill sets There is no question that there is a shortage of data security, information security, and cybersecurity skill sets across the globe. By John Petrie Nov 07, 2017 3 mins Technology Industry IT Skills Staff Management Podcasts Videos Resources Events SUBSCRIBE TO OUR NEWSLETTER From our editors straight to your inbox Get started by entering your email address below. Please enter a valid email address Subscribe