Are You Taking Full Advantage of Threat Intelligence?


Threat intelligence is more than just information. Threat intelligence is evidence-based knowledge about threat actors, the motivation behind an attack, the systems being targeted, the method of attack, and the risk created by the threat. When this data is researched, vetted, analyzed, and put into proper context, it helps organizations detect and respond to known and unknown threats more effectively.

A recent SANS Institute report offered good news and bad news about threat intelligence. The good news is that threat intelligence is used almost universally, and many organizations believe it has enhanced their ability to detect and respond to threats quickly and accurately.

The bad news is that the vast majority of organizations are unable to research or use more than 100 threat indicators each week. That means these organizations are probably wasting money on threat intelligence data they can’t interpret or don’t use due to a lack of infrastructure or manpower. They can’t keep up with such a high volume of alerts.

As the SANS Institute report revealed, most organizations fail to convert threat data into actionable intelligence. They often use free sources to collect raw data that lacks quality control and has a short shelf life. However, there are a number of steps organizations can take to turn threat data into intelligence:

  • Make sure threat data is reviewed quickly by people who know what to investigate and what to ignore.
  • Look for reliable threat data sources that are industry-specific.
  • Automate the receipt and processing data as much as possible.
  • Review data against your organization’s recent activity to quickly detect threats in your network.

Though threat intelligence is critical to an IT security strategy, it can’t replace data collection within your organization. To gain maximum value, external threat intelligence must be compared to internal intelligence. Also, keep in mind that analyzing and applying threat intelligence is not a perfect science. Assumptions and imperfect data are involved. The key is to incorporate sound judgment and experience with state-of-the-art analytics tools to give threat intelligence credibility and reliability.

CyberArk’s Privileged Threat Analytics helps you achieve the right balance of people, process, and technology to protect against threats posed by malicious insiders and external attackers. It collects and analyzes privileged access data from across the enterprise to help security teams identify high-risk behavior, prioritize threats, and speed incident response. The analytics engine delivers best-of-breed detection through statistical modeling, deterministic algorithms, user and entity behavior analytics, and machine learning. Security teams can quickly suspend or terminate privileged sessions to halt malicious activity.

CyberArk has partnered with leading providers to integrate rich threat intelligence data into the CyberArk platform. This enables organizations to correlate enterprise and external data to detect and respond to emerging threats.

Threat intelligence is only useful if data comes from reliable sources and is backed by the right tools and a sound, technology-driven security strategy. Let Clango’s security experts show you how CyberArk Privileged Threat Analytics can help you leverage threat intelligence to identify and contain high-risk privileged activity.


For more information about eliminating privilege escalation vulnerabilities, please send us an email at (

Comments Closed.