Zephyrnet Logo

EMA Research Highlights Cyber Threat Intelligence (CTI) Struggles…

Date:

Text: Cyber Threat Intelligence – Transforming Data Into Relevant Intelligence sponsored by Anomali | Images: Anomali and EMA logos, security lock

Cyber Threat Intelligence – Transforming Data Into Relevant Intelligence report

What is truly alarming is that some of the most popular CTI strategies are the least effective, especially when it concerns filtering CTI data for relevance.

Enterprise Management Associates (EMA™), a leading IT and data management research and consulting firm, released a new research report, “Cyber Threat Intelligence – Transforming Data Into Relevant Intelligence” authored by Christopher M. Steffen, vice president of research covering information security, risk, and compliance management at EMA, and Ken Buckler, research analyst covering information security, risk, and compliance management at EMA. This research report shows that many organizations struggle with effectively leveraging cyber threat intelligence (CTI) and highlights the methods and integrations that have been the most successful.

Many organizations have leveraged cyber threat intelligence for over two decades. Until recent years, threat intelligence was extremely expensive and only the largest organizations with budgets that allowed for such investment adopted it. However, in recent years, CTI has become much more affordable and accessible, with tools dedicated to processing and distributing CTI. Combined with CTI sharing partnerships and information sharing and analysis centers (ISACs), CTI is now more accessible than ever, even for small businesses that were previously financially restricted from accessing this important cybersecurity tool.

This sharing and accessibility present new challenges that result in increased CTI data, however, which must be analyzed for relevance and processed within the organization. It also presents challenges of integrating CTI data with cybersecurity tools, such as SIEM, XDR, or network and endpoint protection. What was once a rare occurrence with signatures that users could input to these tools manually now requires constant data streams that automatically update tools with the latest threat indicators.

“What is truly alarming is that some of the most popular CTI strategies are the least effective, especially when it concerns filtering CTI data for relevance,” stated Buckler. “It appears that organizations are simply filtering the data too much, negatively impacting its usefulness.”

This new research from EMA provides key insights on the CTI sources organizations are having the most success with and how organizations can better leverage CTI in their everyday operations and technology integrations. Most importantly, the research highlights how organizations’ CTI data filtering attempts are counterproductive and how to better leverage CTI.

Some of the key findings include:

CTI Methods and Tools

  • 94% of organizations have a dedicated CTI team
  • 75% of organizations without a dedicated CTI team spend up to 25% of their time processing and responding to CTI

Leveraging Threat Intelligence

  • 84% of organizations focus on proactively providing CTI to the rest of their organization
  • 30% of organizations state that their primary challenge with CTI is useless “noise”

Impact and Results

  • 72% of organizations believe more CTI sharing is needed through mutual partnerships
  • 12% of organizations do not have sufficient staff to analyze and respond to CTI

A detailed analysis of the research findings is available in the report, “Cyber Threat Intelligence – Transforming Data Into Relevant Intelligence.

Anomali sponsored this independent research report.

About EMA

Founded in 1996, EMA is a leading industry analyst firm that provides deep insight across the full spectrum of IT and data management technologies. EMA analysts leverage a unique combination of practical experience, insight into industry best practices, and in-depth knowledge of current and planned vendor solutions to help their clients achieve their goals. Learn more about EMA research, analysis, and consulting services for enterprise line of business users, IT professionals, and IT vendors at http://www.enterprisemanagement.com.

Share article on social media or email:

spot_img

Latest Intelligence

spot_img