It’s time to modernize traditional threat intelligence models for cyber warfare
ATLANTA – When a client asked me to help build a cyber threat intelligence program recently, I jumped at the opportunity to try something new and challenging. To begin, I set about looking for some rudimentary templates with a good outline for building a threat intelligence process, a few solid platforms that are user-friendly, the basic models for cyber intelligence collection and a good website for describing various threats an enterprise might face. Security Intelligence reports.
The Military & Aerospace Electronics take:
7 Feb. 2019 -- There are a handful of rudimentary templates for building a good cyber threat intelligence program available for free online. All of these templates leave out key pieces of information that any novice to the cyber threat intelligence field would be required to know. Most likely, this is done to entice organizations into spending copious amounts of money on a specialist.
The number of companies that specialize in the collection of cyber threat intelligence is growing at a ludicrous rate, and they all offer something that is different, unique to certain industries, proprietary, automated via artificial intelligence (AI) and machine learning, based on pattern recognition, or equipped with behavioral analytics.
The basis for all threat intelligence is heavily rooted in one of three basic models: Lockheed Martin’s Cyber Kill Chain, MITRE’s ATT&CK knowledge base and The Diamond Model of Intrusion Analysis.
John Keller, chief editor
Military & Aerospace Electronics
Ready to make a purchase? Search the Military & Aerospace Electronics Buyer's Guide for companies, new products, press releases, and videos