Government Technology Insider
  • About
  • State & Local
  • Civilian
  • Defense & IC
SUBSCRIBE
No Result
View All Result
  • Acquisition
  • AI & Data
  • Cybersecurity
  • CX
  • Digital Transformation
  • Hybrid Work
    • Work Smarter
  • Public Safety
  • Resources
    • Innovation and Technology to Advance Government
    • World of Work
    • Your Digital Transformation Path Starts Here
    • The Frontlines of Customer Experience
    • Innovative Solutions for Connecting Agencies
    • Be Ready For What’s Next
Government Technology Insider
  • Acquisition
  • AI & Data
  • Cybersecurity
  • CX
  • Digital Transformation
  • Hybrid Work
    • Work Smarter
  • Public Safety
  • Resources
    • Innovation and Technology to Advance Government
    • World of Work
    • Your Digital Transformation Path Starts Here
    • The Frontlines of Customer Experience
    • Innovative Solutions for Connecting Agencies
    • Be Ready For What’s Next
No Result
View All Result
Government Technology Insider
No Result
View All Result
Home AI & Data

What is the Value of Threat Intelligence Today?

by Rebecca Sammons
September 14, 2022
in AI & Data, Cybersecurity, Defense & IC
Reading Time: 3 mins read
A A
What is the Value of Threat Intelligence Today?
Share on FacebookShare on Twitter

Cybersecurity can often feel like an endless cycle of acquisition and deployment. Cybersecurity teams will acquire and deploy the latest solutions for protecting their organization’s data, only for threat actors to discover new ways around those defenses in quick succession. However, building strong cyber defenses isn’t about having the latest technology; it’s about having the intelligence, expertise, and execution to use that technology effectively. By optimizing threat intelligence capabilities, agencies can acquire the tools and skills they need to defend against cyberattacks.

Earlier this year, Forrester released a report evaluating various external threat intelligence services based on their strategies, current offerings, and market presence. The report found that the elements of a strong threat intelligence solution included intelligence analysis, vulnerability intelligence, and an innovation roadmap.

According to the report, “It’s impossible to thoroughly track cyberthreats and the campaigns they undertake without access to primary source intelligence — direct observations via incident response engagements and access to the sensors that observe threat activity.”

Download the Full Report

 

In a recent podcast, Michelle Cantos, Mandiant’s Senior Threat Intelligence Analyst, and Luke McNamara, Mandiant’s Principal Analyst, discussed the various methods by which threat actor groups are leveraging Artificial Intelligence (AI) in their cybercrime operations.

Mandiant’s researchers found that AI acts as a force multiplier to add a layer of complication to pre-existing campaigns. By leveraging AI, threat actors can further disrupt normal operations, make new initial access points for supporting subsequent parts of campaigns, and augment campaigns to make them more frequent and more effective in the future.

In a conversation with Government Technology Insider, McNamara discussed how threat intelligence can optimize cybersecurity efforts. “External threat intelligence can play a useful role in not only shaping that initial view of the [threat] landscape, but on an ongoing basis allow organizations to better understand how these threat actors may be evolving in terms of capability or what campaigns they may be currently conducting domestically and abroad,” McNamara said.

Currently, Mandiant’s researchers are building a better understanding of how threat actors are leveraging AI in their operations. However, as AI becomes more widely available, agencies need to be aware of how cybercrime operations may leverage AI capabilities in the future.

“We may be in a period right now where a number of factors — such as the increasing law enforcement action to even the conflict in Ukraine — have caused disruption within the ransomware ecosystem landscape,” McNamara said. “There are a lot of changes happening right now, and as we see claims by some groups that they are shuttering operations it’s important that we pay attention to see what sort of ecosystem emerges out of this period of change.”

As technology evolves, agencies need to transform both internal operations and their defenses against these emerging cyber threats. Having access to external threat intelligence is extremely valuable for agencies when trying to mitigate risk.

Learn more about how to integrate and optimize threat intelligence capabilities by clicking here.

Tags: AIArtificial Intelligencecyber threat landscapecybersecurityMandiantMichelle Cantos

RELATED POSTS

Meaningful Connections
AI & Data

For CBP and DHS, AI Reveals Meaningful Connections from Disparate Data

January 30, 2023
Identifying the Building Blocks for a Successful Zero Trust Journey
Civilian

Identifying the Building Blocks for a Successful Zero Trust Journey

January 24, 2023
AIOps
AI & Data

How AIOps and Observability Can Improve Network Resiliency During Natural Disasters

January 18, 2023

TRENDING NOW

  • Advana

    Meet Advana: How the Department of Defense Solved its Data Interoperability Challenges

    8514 shares
    Share 3406 Tweet 2129
  • CISA Issues Updated Guidance to Protect Federal Agencies Against Expected Onslaught of DDoS Attacks

    34 shares
    Share 14 Tweet 9
  • Network Slicing Enables Agencies to Create Private, Secure, and Customized Networks: A Podcast

    125 shares
    Share 50 Tweet 31
  • Identifying the Building Blocks for a Successful Zero Trust Journey

    43 shares
    Share 17 Tweet 11

CONNECT WITH US

Advertisement Banner Advertisement Banner Advertisement Banner
Advertisement Banner Ad Advertisement Banner Ad Advertisement Banner Ad
Advertisement Banner Advertisement Banner Advertisement Banner
Advertisement Banner Advertisement Banner Advertisement Banner
Advertisement Banner Ad Advertisement Banner Ad Advertisement Banner Ad
MaaS Nebula Software Factory Banner Ad MaaS Nebula Software Factory Banner Ad MaaS Nebula Software Factory Banner Ad
Advertisement Banner Ad Advertisement Banner Ad Advertisement Banner Ad
Advertisment Banner Ad Advertisment Banner Ad Advertisment Banner Ad
Advertisement Banner Advertisement Banner Advertisement Banner
Advertisement Banner Ad Advertisement Banner Ad Advertisement Banner Ad

BECOME AN INSIDER

Get Government Technology Insider news and updates in your inbox.

Strategic Communications Group is a digital media company that helps business-to-business marketers drive customer demand through content marketing, content syndication, and lead identification.

Related Communities

Financial Technology Today
Future Healthcare Today
Modern Marketing Today
Retail Technology Insider
Today’s Modern Educator

Quick Links

  • Home
  • About
  • Contact Us

Become a Sponsor

Strategic Communications Group offers analytics, content marketing, and lead identification services. Interested?
Contact us!

© 2023 Strategic Communications Group, Inc.
Privacy Policy      |      Terms of Service

No Result
View All Result
  • Home
  • About Government Technology Insider
  • State & Local
  • Civilian
  • Defense & IC
  • Categories
    • Acquisition
    • AI & Data
    • Customer Experience
    • Cybersecurity
    • Digital Transformation
    • Hybrid Work
    • Public Safety
  • Contact Us