UK backed framework for threat intelligence released

MWR InfoSecurity reviews the threat intelligence landscape to produce CPNI and CERT-UK supported guidance for organisations.

MWR InfoSecurity has released a CPNI and CERT-UK supported study entitled Threat Intelligence: Collecting, Analysing, Evaluating, that aims to remove the confusion around threat intelligence and gives vendor neutral advice that can be scaled to different sectors, sizes of organisation, and organisational goals. Whilst high on organisations' RADARs, little consensus exists as to what threat intelligence is, and many companies risk investing huge sums of money with little effect on security. The in-depth report, authored by MWR senior security researcher Dr David Chismon, breaks down the wide range of things marketed as threat intelligence into distinct types, and advises how to build and evaluate a successful threat intelligence programme - and crucially, how not to build one - as well as detailed advice on collecting, analysing, acting on and sharing the information obtained.


“Threat intelligence is rapidly becoming an ever-higher business priority with a general awareness of the need to ‘do’ threat intelligence, but vendors are falling over themselves to offer a confusingly diverse array of threat intelligence products,” said Dr David Chismon, senior security researcher at MWR InfoSecurity and principal author of the report. “There is a risk that in the hurry to keep up with the threat intelligence trend, organisations will end up paying large amounts of money for products that are interesting but of little value in terms of improving the security of their business. ‘Doing’ threat intelligence is important – but doing it right is critical.”


To address this, CPNI and CERT-UK contracted MWR InfoSecurity to review the area and provide a framework for threat intelligence. The resulting paper is the product of literature reviews, internal experience, and a large number of interviews with people involved in threat intelligence and related fields across a range of organisations.


“By taking threat intelligence back to its intelligence roots and applying the same strict principles, it quickly becomes clear that effective threat intelligence focuses on the questions that an organisation wants answered, rather than simply attempting to collect, process, and act on vast quantities of data,” said Dr Chismon. “Yet, it’s vital to be asking the right questions in the first place. Hence this paper looks in detail at the cycle of setting requirements, collecting and analysing data, turning the results into a consumable product and evaluating the usefulness of that product – which then feeds back into asking ‘better’, more useful questions for the future.”


In addition, a helpful “Quick Wins” section is included with actions that organisations can take today, regardless of staff and budget constraints, in order to improve internal threat intelligence practices. Importantly, it assumes no specific current security infrastructure, such as SIEM tools, IDS tools or log aggregation and analysis. 

Emerge research finds that AI investments are now under stricter timelines, compelling leaders to...
Red Hat collaborates with the UK MOD to provide centralised cloud-native platforms aimed at...
Node4 has become an Engage Tech Support Partner within Fortinet's program, strengthening its...
Exclusive Networks partners with Extreme Networks to enhance AI-driven cloud solutions across the...
SentinelOne expands its AI Security Platform with new DSPM features to help secure AI systems amid...
Cisco's latest advancements aim to provide a foundation for AI, emphasising security and...
Birmingham City University partners with Exponential-e to implement a cloud-based communications...
Portnox expands its Zero Trust Network Access solution by including console-based applications,...