Skip to main content

Companies know cyber threat intelligence has proven effective in stopping security incidents. Organizations allocate a growing amount of resources for cyber security in order to strengthen its security posture. At the same time, research indicates that companies are not convinced that the cyber threat intelligence they deploy accomplishes the desired end result.

A new survey by Webroot and The Ponemon Institute features perspectives from 693 IT and security professionals in the U.S. working in organizations of all sizes, from Fortune 1,000 companies all the way down to small businesses under 50 seats.

Research indicates that participants are wary of the reliability of the threat intelligence data they are collecting, as well as its ability to be actionable. Furthermore, frustrations stemming from false positives and perceived cyber threat intelligence deficiencies undercut respondents’ confidence as well.

Cyber Threat Intelligence Perception Gap

View a larger version of the infographic here.

So what should a company look for in its cyber threat intelligence? Webroot executive Patrick Kennedy suggests integrating real-time threat intelligence into security infrastructure in order to more quickly assess the risk of unknown IPs, URLs, files and apps before they enter the IT environment.

See a full copy of Cyber Threat Intelligence to a Strong Security Posture.

Share this Image On Your Site

<a href="https://www.neweggbusiness.com/smartbuyer/visualized/cyber-threat-intelligence-gap/"><img src='//www.neweggbusiness.com/smartbuyer/wp-content/uploads/CyberThreat1.png' alt='Cyber Threat Intelligence Perception Gap' width='900' border='0' /></a>

Cyber Threat Intelligence Perception Gap, design by Dana Choi

Summary
[Infographic] The Cyber Threat Intelligence Perception Gap
Article Name
[Infographic] The Cyber Threat Intelligence Perception Gap
Description
Infographic: Companies know cyber threat intelligence has proven effective in stopping security incidents, but are not convinced solutions give them the desired results.
Author
Adam Lovinus

Author Adam Lovinus

A tech writer and Raspberry Pi enthusiast from Orange County, California.

More posts by Adam Lovinus

Join the discussion One Comment

What's your take?