Using Threat Trends to Protect Network Resources

The Threat Landscape is Evolving Faster Than the Usual Rate of Security Review


Leveraging threat intelligence to improve an organization's security posture should be an essential component of any security strategy. So as I spend time with organizations from around the world to discuss their security challenges, I am surprised to learn how few do this.


Throughout the year, security-focused organizations produce a growing number of threat reports – and they come annually, quarterly, monthly, weekly, and even daily. These reports often contain critical information about the latest trends, targets, and tactics being used by the cybercriminal community. In addition, active threat feeds from security researchers, vendors, and regional and vertical organizations can be leveraged by tools such as SIEMs and integrated into SOCs to ensure that systems are continuously tuned to the latest threat trends.


Analyzing threat trends – especially those collected from live production environments – can provide security professionals with insights into how to better protect their organizations from the latest cyber threats.


Cybercriminals work in packs


One of the most interesting insights gained from looking at recent data collected during Q1 of 2019 (PDF) is that cybercriminals tend to work in unorganized packs. If an exploit or attack vector seems to have worked for one criminal, you can safely assume that there will soon be a swarm of attacks targeting the same thing. That is a high-level trend that anyone familiar with security can see. 


Large scale pack behavior


For example, WordPress is the world’s leading CMS (Content Management System) solution, used to build hundreds of millions of websites. Because data stored in websites – such as mailing lists, medi ..

Support the originator by clicking the read the rest link below.