• Home
  • Cryptography
  • Cyber Security Fundamentals
  • Cyber Threat Intelligence
  • Incident Response and Computer Network Forensics
  • Management and Cyber Security
  • Network Visualization and Vulnerability Detection
  • Operational Policy
  • Reference Link Library
  • Risk Management
  • Secure Software Design and Development
  • Security Architecture
  Keith E. Anderson, Sr.

Cyber threat intelligence

Similar to the concept of intelligence gathered and shared by governments around the world for years, cyber threat intelligence is the advanced preparation of security professionals for the constant onslaught of threats by way of various "threat feeds" from sources like the public (HUMINT), open source community (OSINT), and the cyber/digital intelligence community (CYBINT/DNINT). This intelligence can be leveraged to proactively ensure an organization is carrying-out it's ethical responsibility to safeguard the confidentiality, integrity, and availability of information and assets for all of its stakeholders.

Professionals in the information security space have a professional and, in some cases, ethical responsibility to ensure the community is aware of the tactics, techniques, and procedures (TTPs) of threat actors they may have comes across in their environments. This awareness can not only provide the capability for other organizations to provide sufficient defenses for said adversaries, it can also begin the process of narrowing the opportunities for bad actors to exploit potential vulnerabilities in unsuspecting organizational infrastructures.
Picture
ZeroFox (2015). Forrester Publishes Inaugural Cyber Threat Intelligence Report
Reflection
Cyber Threat Intelligence Plan
CISA - Information Sharing and Awareness
Top Five Open Source Intelligence (OSINT) Tools
FBI InfraGard Portal (must apply for membership)
10 of the Best Open Source Threat Intelligence Feeds
Powered by Create your own unique website with customizable templates.
  • Home
  • Cryptography
  • Cyber Security Fundamentals
  • Cyber Threat Intelligence
  • Incident Response and Computer Network Forensics
  • Management and Cyber Security
  • Network Visualization and Vulnerability Detection
  • Operational Policy
  • Reference Link Library
  • Risk Management
  • Secure Software Design and Development
  • Security Architecture