Kept Under Wraps: Half Of Companies Prohibit Sharing Threat Intelligence Findings With Professional Communities

Kept Under Wraps: Half Of Companies Prohibit Sharing Threat Intelligence Findings With Professional Communities
Spread the love

Two-thirds (66 percent) of threat intelligence (TI) analysts are involved in professional communities, but 52 percent of all those working in IT and cybersecurity roles are not allowed to share threat intelligence artifacts discovered through those communities, finds a new Kaspersky report, ‘Managing your IT security team’.

Kaspersky is a long-time advocate for international collaboration in cyberspace and contributes to joint initiatives across the global IT security community. The company sees this approach as the best way to protect from ever-evolving cyberthreats. As such, Kaspersky surveyed more than 5,200 IT and cybersecurity practitioners globally for this report, to see if other businesses were ready to collaborate and share TI.

The research found that respondents with TI analysis responsibilities, in particular, are likely to participate in specialised forums and blogs (45 percent), dark web forums (29 percent) or social media groups (22 percent).

But when it comes to sharing their own findings, only 44 percent of respondents have actually made their discoveries public. Conversely, in companies where external sharing is allowed, 77 percent of security analysts did so. In eight percent of cases, security analysts even shared TI findings despite it being prohibited by the organisation they work at.

Kaspersky experts noted that such restrictions are partly driven by concerns that if some objects are known publicly before a company can respond to an attack, then cybercriminals may realise that they have been detected and change their tactics. To help IT security teams analyse suspicious objects without a risk of exposing the investigation, Kaspersky provides a private submission mode option through free access to Kaspersky Threat Intelligence Portal. Thanks to this, a cybercriminal will not know that someone has shared samples, and an analyst can still receive the required data.

“Any piece of information – be it new malware or insights on techniques used – is valuable when protecting against advanced threats. That’s why we constantly make our threat research findings available via our information resources and through our TI services. We encourage security analysts to also give a helping hand to others in the same collaborative way,” – comments Anatoly Simonenko, Group Manager, Technology Solutions Product Management, at Kaspersky.

 

Check these articles out:

Deployment Of Kaspersky’s Industrial CyberSecurity (KICS) Solution, Leveraging On iTrust’s Test Bed

Donau Chemie Group Partners With Kaspersky Lab To Boost Its Cyber-Defences

Strengthening Security In the Warehouse Despite Legacy Technology

APAC Set To Emerge As Epicenter For AI Growth

Kaspersky: 11M Cyber Attacks Initiated From Singapore In 2019

 

CLICK HERE FOR LATEST NEWS.

READ CURRENT AND PAST ISSUES OF IAA.

KEEP YOURSELF UPDATED, SUBSCRIBE TO IAA NOW!

AND DON’T FORGET FOLLOW US ON FACEBOOK, LINKEDIN AND TWITTER!

 

 

Infineon Introduces AIROC Wi-Fi 6/6E And Bluetooth 5.2 Combo Family For IoT And Streaming Devices
New iMOTION SmartDriver Family IMD110 With Three-Phase Gate Driver Offers Integration And Flexibility