Access your Pro+ Content below.
Cyberthreat intelligence is getting crowded
This article is part of the June 2014 Vol. 16 / No. 5 issue of Information Security magazine
When it comes to dealing with zero-day threats, time is of the essence. The quicker an IT security team can respond and repel an attack, the safer the organization. Many security teams rely on pattern matches and malware databases, but these methods have become less effective as custom viruses, created almost continuously, make algorithms obsolete. Crowdsourcing threat data so that a community can act quickly and repeal potential invasions is delivering results for more enterprises. Karl Hart, IT security analyst for Ohio National Financial Services in Cincinnati, has used AlienVault's Open Threat Exchange (OTX) for several years. "We have found better than a 90% success rate with finding infected hosts when we receive an alert from the platform," he said. "We know that our antivirus software doesn't catch everything, and this allows us to become more proactive and find malicious actors more readily. The chances of finding these without OTX would be close to zero." We see malware warnings a few days to a month ahead of what is ...
Features in this issue
Learn how threat intelligence plays into global risk assessment as more security officers are tasked with damage control.
As threat intelligence communities multiply, it may be time to revisit crowdsourcing security.
Are there shadow networks within your enterprise? Stop malware by shutting down command-and-control communication channels.
This Beyond the Page explores the latest advances in threat intelligence and related technology, including threat information sharing services, SIEM and endpoint security products.
Columns in this issue
Threat intelligence can shine a light on important security holes.
Medical data is the next frontier, Avi Rubin tells Marcus Ranum, as Johns Hopkins University seeks to insulate medical information systems from hackers.
How to evaluate whether PCI DSS is lowering credit card fraud and the risks associated with data breach disclosure.