It’s time to modernize traditional threat intelligence models for cyber warfare

Feb. 7, 2019
ATLANTA – When a client asked me to help build a cyber threat intelligence program recently, I jumped at the opportunity to try something new and challenging. To begin, I set about looking for some rudimentary templates with a good outline for building a threat intelligence process, a few solid platforms that are user-friendly, the basic models for cyber intelligence collection and a good website for describing various threats an enterprise might face. Security Intelligence reports.
ATLANTA – When a client asked me to help build a cyber warfare threat intelligence program recently, I jumped at the opportunity to try something new and challenging. To begin, I set about looking for some rudimentary templates with a good outline for building a threat intelligence process, a few solid platforms that are user-friendly, the basic models for cyber intelligence collection and a good website for describing various threats an enterprise might face. Security Intelligence reports. Continue reading original article

The Military & Aerospace Electronics take:

7 Feb. 2019 -- There are a handful of rudimentary templates for building a good cyber threat intelligence program available for free online. All of these templates leave out key pieces of information that any novice to the cyber threat intelligence field would be required to know. Most likely, this is done to entice organizations into spending copious amounts of money on a specialist.

The number of companies that specialize in the collection of cyber threat intelligence is growing at a ludicrous rate, and they all offer something that is different, unique to certain industries, proprietary, automated via artificial intelligence (AI) and machine learning, based on pattern recognition, or equipped with behavioral analytics.

The basis for all threat intelligence is heavily rooted in one of three basic models: Lockheed Martin’s Cyber Kill Chain, MITRE’s ATT&CK knowledge base and The Diamond Model of Intrusion Analysis.

Related: Air Force asks industry's help to use digital signal processing for improving SIGINT and cyber intelligence

Related: As cyber attacks of the future become more automated and autonomous, so must the cyber security

Related: Accenture boosts expertise in cyber security and cyber intelligence with iDefense acquisition

John Keller, chief editor
Military & Aerospace Electronics

Ready to make a purchase? Search the Military & Aerospace Electronics Buyer's Guide for companies, new products, press releases, and videos

Voice your opinion!

To join the conversation, and become an exclusive member of Military Aerospace, create an account today!