Sunday, July 3, 2022
  • Events
  • Interviews
  • Jobs
  • Opinion
  • Whitepapers
  • Glossary
  • Community Forum
  • Web Hosting Directory
  • Login
  • Register
Cloud7 News
  • Cloud Computing
  • Web Hosting
  • Data Center
  • Linux
  • Cybersecurity
  • More
    • Network/Internet
    • Windows
    • Software
    • Hardware
    • Blockchain
    • Policy/Legislation
    • How-Tos
    • Troubleshooting
No Result
View All Result
Cloud7 News
  • Cloud Computing
  • Web Hosting
  • Data Center
  • Linux
  • Cybersecurity
  • More
    • Network/Internet
    • Windows
    • Software
    • Hardware
    • Blockchain
    • Policy/Legislation
    • How-Tos
    • Troubleshooting
No Result
View All Result
Cloud7 News
No Result
View All Result

Home > Cybersecurity > Most of the companies have at least one dedicated threat intelligence analyst

Most of the companies have at least one dedicated threat intelligence analyst

Cybersixgill has partnered with Dark Reading to produce the 2021 State of Threat Intelligence report.

Seda Nur Cinar by Seda Nur Cinar
March 4, 2021
in Cybersecurity
2 min read
0 0
0
Most of the companies have at least one dedicated threat intelligence analyst
0
SHARES
12
VIEWS
Share on FacebookShare on TwitterShare on EmailFollow on Google News

Cybersixgill has partnered with Dark Reading to produce the 2021 State of Threat Intelligence report. The report surveyed 106 cybersecurity executives at large enterprises, covering various aspects of threat intelligence from common use-cases to operational challenges.

54% have more than five threat intelligence analyst

While the area of deep and dark threat intelligence is gaining traction across the cybersecurity industry, many are struggling with a large knowledge gap regarding deep and dark web intelligence collection, the importance of intel freshness, the speed and rate of collections, as well as their overall impact on an organization’s cybersecurity programs and posture.

Meira Primes, CMO of Cybersixgill
Meira Primes, CMO, Cybersixgill

Meira Primes, CMO of Cybersixgill, said,

“The deep and dark web is the world’s third-largest economy after the US and China. In other words, if you’re a cyber criminal – you have to be there. Organizations are drowning in irrelevant data, false positives and lack of ‘big picture’ understanding. Those who fail to adapt and act accordingly will not be able to advance their cyber defense strategy and protect their organization against cyber threats.”

77% of organizations have at least one dedicated threat intelligence analyst, and 54% have more than five. Yet an overwhelming 48% of organizations struggle with inaccurate data and 46% with stale data.

Key findings

  • Multiple Breaches: 25% of organizations have experienced six or more security breaches in the previous 12 months.
  • Long time to action: 35% of organizations say it takes 12 hours or more to supplement new threat intelligence data with enough research to begin escalating and remediating incidents.
  • Drowning in data: 35% of organizations use seven or more threat feeds at a time.
    Time wasted on false Positives: 95% of organizations waste anywhere from one hour to five days per week per analyst on false positives.
  • Obsolete data impacting almost half of the organizations: 48% of organizations struggle with inaccurate threat intelligence data and 46% with stale data.
  • Lack of context: 40% of organizations cite lack of context as the biggest source of dissatisfaction in threat intelligence.

The report suggests that cybersecurity professionals might have to shift the way they approach threat intelligence and implement a modern methodology that includes automating the collection, analysis, research, and response in order to minimize the amount of manual labor it takes to truly operationalize threat intelligence.

See more Cyber Security News


Tags: Dark ReadingSixgill
ShareTweetSendShare
Seda Nur Cinar

Seda Nur Cinar

Seda Nur Cinar is the news editor of the Cloud7 News. With more than 8 years of Linux and cloud experience, Seda is a Linux and opensource enthusiast, security researcher and a web application developer.

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

I agree to the Terms & Conditions and Privacy Policy.

Next Post
Parler dropped one lawsuit but filed another against AWS

Parler dropped one lawsuit but filed another against AWS

Related News

8220 gang targeting Linux systems again, Microsoft says

8220 gang targeting Linux systems again, Microsoft says

July 1, 2022 2:52 pm
Kaspersky found a module backdoor in Microsoft Exchange

Kaspersky found a module backdoor in Microsoft Exchange

July 1, 2022 1:50 pm
CISA pinpoints the PwnKit threat

CISA pinpoints the PwnKit threat

June 30, 2022 5:50 pm
Attackers has breached AMD network and exfiltrated data

Attackers have breached the AMD network and exfiltrated data

June 30, 2022 5:30 pm
Get free daily newsletters from Cloud7 News Get the Cloud7 Newsletter

Check your inbox or spam folder to confirm your subscription.

By subscribing, you agree to our
Copyright Policy and Privacy Policy

Editor's Choice

Interview with Igor Seletskiy on AlmaLinux

7 best hosting control panels

How to update Linux Kernel without rebooting?

7 best Linux mail servers for 2022

7 best cPanel alternatives for 2022

7 best Linux web browsers for 2022

7 best CentOS alternatives

7 best Linux server distros for 2022

How to scan your server for Log4j (Log4Shell) vulnerability

10 Best Web Hosting Services of 2022

AlmaLinux 8.6 Stable is ready to download

Ubuntu 22.04 LTS is available for download. What is new?

Kali Linux 2022.2 is ready for download

Advertisement

Recent News

  • Weekly round-up: 27 June – 1 July
  • Cloud7 Podcast – Episode 09: AlmaLinux OS
  • Snap app of the week: Sensors Unity
  • Server cabinet types and accessories
  • How to change WordPress password via phpMyAdmin

Our Latest Interview

Interview: Erez Barak, Vice President Observability of Sumo Logic
Interview

Interview: Erez Barak, Vice President Observability of Sumo Logic

by Atalay Kelestemur
November 25, 2021 3:23 am


Cloud7 News is a news source that publishes the latest news, industry news and exclusive interviews on web hosting, cloud computing, data center, cybersecurity and linux.

News Categories

  • Web Hosting
  • Cloud Computing
  • Data Center
  • Cybersecurity
  • Linux
  • Network/Internet
  • Software
  • Hardware
  • Blockchain

Our Free Modules

  • Events
  • Interviews
  • Jobs
  • Opinion
  • Whitepapers
  • Glossary
  • Community Forum
  • Web Hosting Directory

Get the Cloud7 Newsletter

Get FREE daily newsletters from Cloud7 delivering the latest news and reviews.

  • About
  • Privacy & Policy
  • Copyright Policy
  • Contact

© 2022, Cloud7 News. Latest Cloud Computing, Web Hosting, Data Center Industry and Tech News

No Result
View All Result
  • Cloud Computing
  • Web Hosting
  • Data Center
  • Linux
  • Cybersecurity
  • More
    • Network/Internet
    • Windows
    • Software
    • Hardware
    • Blockchain
    • Policy/Legislation
    • How-Tos
    • Troubleshooting
  • Events
  • Interviews
  • Jobs
  • Opinion
  • Whitepapers
  • Glossary
  • Community Forum
  • Web Hosting Directory

© 2022, Cloud7 News. Latest Cloud Computing, Web Hosting, Data Center Industry and Tech News

Welcome Back!

Sign In with Facebook
Sign In with Google
Sign In with Linked In
OR

Login to your account below

Forgotten Password? Sign Up

Create New Account!

Sign Up with Facebook
Sign Up with Google
Sign Up with Linked In
OR

Fill the forms below to register

*By registering into our website, you agree to the Terms & Conditions and Privacy Policy.
All fields are required. Log In

Retrieve your password

Please enter your username or email address to reset your password.

Log In
This website uses cookies. By continuing to use this website you are giving consent to cookies being used. Visit our Privacy and Cookie Policy.