Skip to content

The New Silobreaker Ransomware Report – An analysis of disclosure and messaging from open sources Learn More +

  • How it works
  • Solutions
        • Cyber Threat Intelligence
          • APT Monitoring
          • Asset Monitoring
          • Cyber Threat Landscape Intelligence
          • Data Breach Intelligence
          • Fraud Intelligence
          • Phishing Intelligence
          • Ransomware Intelligence
          • Supply Chain Threat Intelligence
          • Vulnerability Intelligence
        • Strategic and Political Intelligence
          • Competitor Benchmarking Intelligence
          • Conflict and Geopolitical Intelligence
          • Corporate Risk Intelligence
        • Physical Risk Intelligence
          • Areas of Operation Intelligence
          • Events and Activism Intelligence
        • Brand Threat Protection
        • Industries
          • Critical Infrastructure
          • Financial Services
          • Government and Defence
          • Healthcare and Pharma
          • Service Providers
          • Retail
          • Technology and Telecoms
  • Alerts
        • Silobreaker Demo

          See a demo of Silobreaker in action

          Request a demo +

        • Free Intelligence Email Alerts
          • COVID-19 Threat Alert​
          • Daily Cyber Alert
          • Weekly Cyber Digest
          • Financial Services Threat Alert
          • Ransomware Rewind
          • Russia-Ukraine Insights Alert​
          • US Politics Media Watch​
  • Resources
        • Silobreaker ROI

          Answer more intelligence use cases with a single tool

          Read our ROI Report +

        • Data SheetsDownload our product information
        • EventsMeet our team of experts
        • Customer StoriesLearn how customers reduce risk
        • ReportsIn-depth analysis and insights
        • WebinarsOnline events you don’t want to miss
  • Partners
  • Company
        • Customer Support

          Get product support from our experts

          Contact support +
        • AboutLearn about our people and awards
        • CareersIt’s a great time to join Silobreaker
        • PressAll the latest buzz on the company
        • Contact usGet in touch with sales and support
  • Free Trial
  • Login
  • Request demo
Menu
  • Request demo

How to cut through the data noise and leverage actionable security and threat intelligence

  • August 30, 2022

When it comes to the power of good intelligence, it’s important to first make a distinction: data is not intelligence. Data is the raw material that needs refining before it can become a finished product – the intelligence that can prompt actions that keep businesses safe and secure.

30 August 2022 – Data can typically come in four distinct forms: open-source data, available from the internet most of us use; underground data, which can only be found on places such as the Dark Web; premium data, specifically curated and often only accessible behind paywalls; finally, there is internal data, often purchased or produced by organisations themselves.

It is fair to say we live in an age in which we are ‘drowning’ in data, particularly when you consider that the volume of data worldwide has grown by almost 5,000 percent between 2010-22. But how do we make sense of all this data, and why does good intelligence matter to businesses today?

 

Understanding the intelligence cycle

In the early-2000s, having the greatest amount of data gave businesses an advantage over others, but as the volume of data has grown, its unit value has decreased. It’s now less about the quantity of data organisations have but more about how to best use it. But in order to make sense of the overwhelming amount of data at their disposal, businesses need to be able to find what matters and learn from it in a meaningful way.

To do so, it is helpful to follow a basic intelligence cycle that consists of five distinct stages:

1. The company considers what intelligence they need and why

2. Data collection is undertaken from all or a subset of the sources mentioned above

3. Data is processed by algorithms and other technology to read, contextualise and make sense of it

4. Analysts examine the processed data and use tools to analyse it and produce the required intelligence

5. The intelligence can now be disseminated back to the relevant teams and decision makers.

Once the intelligence is disseminated, key stakeholders can action it and use it to support their decision-making, as well as set new requirements for the next cycle. Of all the stages, processing of data is where technology plays the most critical role. Context and knowledge at speed is key for any intelligence operation, and humans are incapable of sifting through, reading and processing the amount of data available today.

Without the right perspective on threats and opportunities, a business’s decision-making abilities are significantly compromised, which can ultimately leave an organisation unnecessarily vulnerable.

 

 

Breaking down the intelligence silos
For security and threat intelligence to be the most effective, another key approach of is to break down traditional intelligence silos. To understand the threat landscape facing an organisation requires awareness of how intertwined threats and risks are across the cyber, physical, strategic and political spectrums. Data, systems, processes and teams and their workflows must reflect this new way of thinking.
 
It’s important to view the world of intelligence as more of a Venn diagram where cyber, physical, strategic and political intelligence all coexist with overlapping parts. For example, while an election may seemingly have little to do with cyber or physical risk on the surface, the leadup and outcome is likely to trigger phishing campaigns and other cyber activity from hostile actors, or spark a protest that could result in physical damage. As a result, what started in the political sphere can directly lead to harm in the cyber world, as well as the physical one.
 
For instance, a US-based bank with over 10,000 employees was initially concerned about physical security threats impacting their locations, ranging from crime and extreme weather conditions to fire and other potentially disruptive events. As a result, the bank turned to a centralised platform to gather the physical threat intelligence in an effective and timely manner, with information on everything from travel advisories and weather warnings to news reports and on-the-ground tweets. Once the security team saw the insights gained from physical threat alerts, they decided to expand the usage of the tool across cyber and other use-cases of the bank to help senior leadership make even more informed and timely decisions.
 
When it comes to cutting through the data noise, there is tremendous value in breaking down intelligence silos and embracing a more holistic and multi-disciplinary approach. With the right planning and perspective, businesses can be best prepared to predict, protect and respond to the broad range of risks and threats facing them today.
 
 
 

About Silobreaker

Silobreaker helps business, security and intelligence professionals make sense of the vast amounts of data which exist in the world. Using innovative tools and visualisations, Silobreaker helps contextualise and analyse data from a variety of sources. In doing so, it allows users to track threats, vulnerabilities, and malicious actors, as well as monitor developments in a number of industries, flagging up incidents or events of interest to customers.

PrevPreviousSilobreaker and PolySwarm strengthen partnership with new integration features
NextSilobreaker unveils new 24/7 Brand Threat Protection and managed takedown serviceNext

Home – News Items – How to cut through the data noise and leverage actionable security and threat intelligence

Get started today

Ready to try it for yourself? Request a demo of Silobreaker today.

Request demo
Silobreaker
Linkedin-in Twitter Facebook-f

Product

  • How it Works
  • Industries
  • How it Works
  • Industries

Log in

Resources

  • Alerts
  • Data Sheets
  • Webinars
  • Reports
  • Glossary
  • Alerts
  • Data Sheets
  • Webinars
  • Reports
  • Glossary

Partners

  • Integration Partners
  • Channel Partners
  • Integration Partners
  • Channel Partners

Company

  • About Silobreaker
  • News
  • Careers
  • Services
  • Legal
  • Privacy Policy
  • About Silobreaker
  • News
  • Careers
  • Services
  • Legal
  • Privacy Policy

Contact

  • Sales
  • Support
  • Offices
  • Sales
  • Support
  • Offices
Copyright © 2023 by Silobreaker Limited. All rights reserved.
Manage consent
We use cookies on our website to give you the most relevant experience by remembering your preferences and repeat visits. By clicking “Accept All”, you consent to the use of ALL the cookies. However, you may visit "Cookie Settings" to provide a controlled consent.
Cookie SettingsAccept All
Manage consent

Privacy Overview

This website uses cookies to improve your experience while you navigate through the website. Out of these, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities of the website. We also use third-party cookies that help us analyze and understand how you use this website. These cookies will be stored in your browser only with your consent. You also have the option to opt-out of these cookies. But opting out of some of these cookies may affect your browsing experience.
Necessary
Always Enabled
Necessary cookies are absolutely essential for the website to function properly. These cookies ensure basic functionalities and security features of the website, anonymously.
CookieDurationDescription
__hssrcsessionThis cookie is set by Hubspot whenever it changes the session cookie. The __hssrc cookie set to 1 indicates that the user has restarted the browser, and if the cookie does not exist, it is assumed to be a new session.
cookielawinfo-checkbox-advertisement1 yearSet by the GDPR Cookie Consent plugin, this cookie is used to record the user consent for the cookies in the "Advertisement" category .
cookielawinfo-checkbox-analytics11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Analytics".
cookielawinfo-checkbox-functional11 monthsThe cookie is set by GDPR cookie consent to record the user consent for the cookies in the category "Functional".
cookielawinfo-checkbox-necessary11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookies is used to store the user consent for the cookies in the category "Necessary".
cookielawinfo-checkbox-others11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Other.
cookielawinfo-checkbox-performance11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Performance".
CookieLawInfoConsent1 yearRecords the default button state of the corresponding category & the status of CCPA. It works only in coordination with the primary cookie.
elementorneverThis cookie is used by the website's WordPress theme. It allows the website owner to implement or change the website's content in real-time.
viewed_cookie_policy11 monthsThe cookie is set by the GDPR Cookie Consent plugin and is used to store whether or not user has consented to the use of cookies. It does not store any personal data.
Functional
Functional cookies help to perform certain functionalities like sharing the content of the website on social media platforms, collect feedbacks, and other third-party features.
CookieDurationDescription
__cf_bm30 minutesThis cookie, set by Cloudflare, is used to support Cloudflare Bot Management.
__hssc30 minutesHubSpot sets this cookie to keep track of sessions and to determine if HubSpot should increment the session number and timestamps in the __hstc cookie.
bcookie1 yearLinkedIn sets this cookie from LinkedIn share buttons and ad tags to recognize browser ID.
bscookie1 yearLinkedIn sets this cookie to store performed actions on the website.
langsessionLinkedIn sets this cookie to remember a user's language setting.
lidc1 dayLinkedIn sets the lidc cookie to facilitate data center selection.
UserMatchHistory1 monthLinkedIn sets this cookie for LinkedIn Ads ID syncing.
Performance
Performance cookies are used to understand and analyze the key performance indexes of the website which helps in delivering a better user experience for the visitors.
CookieDurationDescription
_uetsid1 dayBing Ads sets this cookie to engage with a user that has previously visited the website.
_uetvid1 year 24 daysBing Ads sets this cookie to engage with a user that has previously visited the website.
SRM_B1 year 24 daysUsed by Microsoft Advertising as a unique ID for visitors.
Analytics
Analytical cookies are used to understand how visitors interact with the website. These cookies help provide information on metrics the number of visitors, bounce rate, traffic source, etc.
CookieDurationDescription
__hstc5 months 27 daysThis is the main cookie set by Hubspot, for tracking visitors. It contains the domain, initial timestamp (first visit), last timestamp (last visit), current timestamp (this visit), and session number (increments for each subsequent session).
_ga2 yearsThe _ga cookie, installed by Google Analytics, calculates visitor, session and campaign data and also keeps track of site usage for the site's analytics report. The cookie stores information anonymously and assigns a randomly generated number to recognize unique visitors.
_gat_gtag_UA_1737047_91 minuteSet by Google to distinguish users.
_gcl_au3 monthsProvided by Google Tag Manager to experiment advertisement efficiency of websites using their services.
_gid1 dayInstalled by Google Analytics, _gid cookie stores information on how visitors use a website, while also creating an analytics report of the website's performance. Some of the data that are collected include the number of visitors, their source, and the pages they visit anonymously.
hubspotutk5 months 27 daysHubSpot sets this cookie to keep track of the visitors to the website. This cookie is passed to HubSpot on form submission and used when deduplicating contacts.
Advertisement
Advertisement cookies are used to provide visitors with relevant ads and marketing campaigns. These cookies track visitors across websites and collect information to provide customized ads.
CookieDurationDescription
ANONCHK10 minutesThe ANONCHK cookie, set by Bing, is used to store a user's session ID and also verify the clicks from ads on the Bing search engine. The cookie helps in reporting and personalization as well.
MUID1 year 24 daysBing sets this cookie to recognize unique web browsers visiting Microsoft sites. This cookie is used for advertising, site analytics, and other operations.
test_cookie15 minutesThe test_cookie is set by doubleclick.net and is used to determine if the user's browser supports cookies.
Others
Other uncategorized cookies are those that are being analyzed and have not been classified into a category as yet.
CookieDurationDescription
_clck1 yearNo description
_clsk1 dayNo description
AnalyticsSyncHistory1 monthNo description
CLID1 yearNo description
li_gc5 months 27 daysNo description
SMsessionNo description available.
SAVE & ACCEPT
Powered by CookieYes Logo