It’s time to modernize traditional threat intelligence models for cyber warfare
Feb. 7, 2019
The Military & Aerospace Electronics take:
7 Feb. 2019 -- There are a handful of rudimentary templates for building a good cyber threat intelligence program available for free online. All of these templates leave out key pieces of information that any novice to the cyber threat intelligence field would be required to know. Most likely, this is done to entice organizations into spending copious amounts of money on a specialist.
The number of companies that specialize in the collection of cyber threat intelligence is growing at a ludicrous rate, and they all offer something that is different, unique to certain industries, proprietary, automated via artificial intelligence (AI) and machine learning, based on pattern recognition, or equipped with behavioral analytics.
The basis for all threat intelligence is heavily rooted in one of three basic models: Lockheed Martin’s Cyber Kill Chain, MITRE’s ATT&CK knowledge base and The Diamond Model of Intrusion Analysis.
John Keller, chief editor
Military & Aerospace Electronics
Ready to make a purchase? Search the Military & Aerospace Electronics Buyer's Guide for companies, new products, press releases, and videos