Subscribe / Unsubscribe Enewsletters | Login | Register

Pencil Banner

Thwarting attackers with threat intelligence

Greg Akers, SVP of Advanced Security Initiatives and CTO, Cisco Security and Trust Organisation | Nov. 25, 2014
News reports show cyber attacks continue to outpace IT’s ability to protect critical data, but teams that have built systems to deliver accurate threat intelligence can often end an attack before damage is done.

However, by using network analysis techniques that enable the collection of IP network traffic as it enters or exits an interface, security teams can correlate identity and context. This enables teams to synthesize what they learn from multiple sources of information to help identify and stop threats. Sources include what they know from the Web and what is happening in the network, as well as a growing amount of collaborative intelligence gleaned from exchange with public and private organizations.

A well-constructed cybersecurity strategy will include an all-inclusive threat control plan that addresses the entire attack continuum: before, during and after. This enables security teams to find threats, defend against them and remediate the vulnerabilities that let them happen in the first place. When threat intelligence is used at the organizational and operational level, it provides a more comprehensive security posture. This process helps defenders think like attackers, and to use these insights to better protect their environments.


Previous Page  1  2 

Sign up for CIO Asia eNewsletters.