Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
Cybersecurity News

How Advancing Threat Intelligence Can Combat Cyber Attacks

By Greg Akers
July 8, 2014

Technology, demographics, economic and geopolitical forces are constantly shifting, creating a fluid cybersecurity environment. Cyber criminals are designing and implementing tailored malware, advanced persistent threats, massive Distributed Denial of Service (DDoS) attacks and an endless variety of other techniques to disrupt organizations of all types, across all industries. Faced with these challenges, security teams are developing new approaches to safeguard their organizations from a variety of increasingly sophisticated attackers.

In most attack scenarios, cyber criminals follow a standardized approach to infiltrate a target, including research, preparation, deployment and control.  This is also known as the “attack chain.” Each step has a distinct signature, if you know where to find it. With enough visibility into the extended network and robust intelligence, an attack can often be detected and stopped before it inflicts much damage. Intelligence comes from a variety of sources, including native intelligence from within the organization, commercially available information and ongoing analysis of user behavior. This combined intelligence enables the most effective detection of threats. Using the network to gather intelligence allows cyber defenders to gain a better understanding of what their adversaries are doing, and how to prevent it.

The most efficient way to limit the attack chain and protect valuable resources is to employ a security approach that is more sophisticated than the attackers’ abilities, and addresses the extended network environment. Since an attack can be broken down into stages, it is then essential to think of a response to an attack in stages as well – before, during and after. This cycle operates non-stop for anyone in the security profession.

Let’s take a deeper dive into each stage:

Before: Security teams are continuously scanning for areas where they may be vulnerable to infiltration. Classically, security has been all about defense. Today, teams are setting up ways to more intelligently halt intruders with total visibility into their environments – including, but not limited to protocols, users, content, physical and virtual hosts, operating systems, applications, services and network behavior. This knowledge can be used for defenders to take action before an attack has even begun.

During an attack, it is critical to understand what is occurring, and how to stop it as rapidly as possible. Security teams need to be able to continuously address threats. Tools including content inspection, behavior anomaly detection, context awareness of users, devices, location information and applications are critical to understanding an attack as it is unfolding. Security teams have to discover where, what and how users are connected to applications and resources.

After an attack or breach, security teams need to quickly understand the attack that occurred as well as how to analyze and mitigate the damage. Advanced forensics tools help defenders learn from attacks. Could anything have been done to prevent the breach? Where did the attacker come from? How did they find a hole in the network? Additionally, this type of retrospective security allows for an infrastructure that gathers and analyzes data to create security intelligence on an ongoing basis. Breaches that may have gone undetected for weeks or even months can be identified, contained and remediated much more quickly.

It logically follows that the most essential element of any defensive strategy is intelligence and understanding. Cybersecurity teams are constantly trying to learn more about who their enemies are, why they are attacking, and how.  This is where the extended network provides unrivaled value with a depth of intelligence that cannot be attained anywhere else in the IT environment. Much like in counter terrorism, intelligence is central to stopping attacks.

Similar to other areas of modern warfare, security in cyberspace is often an asymmetric situation. Smaller, faster adversaries with limited means can inflict disproportionate damage on massive adversaries. In these asymmetric environments, intelligence is one of the most important assets for addressing threats. However, intelligence alone is of little benefit without an approach that optimizes the organizational and operational use of that intelligence.

Network analysis techniques provide the ability to collect IP network traffic as it enters or exits an interface, allowing security teams to correlate identity and context, and then add to that threat intelligence and analytics capabilities. This allows security teams to combine what they learn from multiple sources of information, including the web, the network, as well as an ever-expanding amount of collaborative intelligence, gathered from exchange with public and private entities to help identify and stop threats.  

The most effective cybersecurity approach requires a framework that incorporates the central interests, opportunities, and challenges that an organization faces and aligns its governance, operations and enterprise capabilities to match. In other words, it allows defenders to think like attackers and better protect their environments. This framework must be guided by the enterprise security team’s own threat intelligence practice which combines commercial threat information with native analysis of user behavior to detect, protect against, and remediate security incidents as quickly and effectively as possible.

KEYWORDS: cyber attack cyber attack detection cybercrime security intelligence

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Greg Akers is the Senior Vice President of Advanced Security Initiatives and Chief Technology Officer within the Threat Response, Intelligence and Development (TRIAD) group at Cisco. With more than two decades of executive experience, Akers brings a wide range of technical and security knowledge to his current role.

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Iintegration and use of emerging tools

    Future Proof Your Security Career with AI Skills

    AI’s evolution demands security leaders master...
    Columns
    By: Jerry J. Brennan and Joanne R. Pollock
  • The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report surveys enterprise...
    The Security Benchmark Report
    By: Rachelle Blair-Frasier
  • The Most Influential People in Security 2025

    Security’s Most Influential People in Security 2025

    Security Magazine’s 2025 Most Influential People in...
    Most Influential People in Security
    By: Security Staff
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • critical event management
    Sponsored byEverbridge

    Why a Unified View Across IT, Continuity, and Security Makes or Breaks Crisis Response

  • Charlotte Star Room
    Sponsored byAMAROK

    In an Uncertain Economy, Security Is a Necessity - Not an Afterthought

  • Sureview screen
    Sponsored bySureView Systems

    The Evolution of Automation in the Command Center

Popular Stories

Cybersecurity trends of 2025

3 Top Cybersecurity Trends from 2025

Red laptop

Security Leaders Discuss SitusAMC Cyberattack

Green code

Logitech Confirms Data Breach, Security Leaders Respond

Neon human and android hands

65% of the Forbes AI 50 List Leaked Sensitive Information

The Louvre

After the Theft: Why Camera Upgrades Should Begin With a Risk Assessment

Top Cybersecurity Leaders

Events

September 18, 2025

Security Under Fire: Insights on Active Shooter Preparedness and Recovery

ON DEMAND: In today’s complex threat environment, active shooter incidents demand swift, coordinated and well-informed responses.

December 11, 2025

Responding to Evolving Threats in Retail Environments

Retail security professionals are facing an increasingly complex array of security challenges — everything from organized retail crime to evolving cyber-physical threats and public safety concerns.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • people talking to pharmacist at counter

    How pharma organizations can combat third party cyberattacks

    See More
  • cyber-threat-freepik1170x658v56.jpg

    Cyber warfare: How to empower your defense strategy with threat intelligence

    See More
  • people working together over a table

    How CISOs and CFOs can collaborate to combat cyber threats

    See More

Related Products

See More Products
  • 150952519X.jpg

    Intelligence in An Insecure World, 3rd Edition

  • threat and detection.jpg

    Surveillance and Threat Detection

  • 1119490936.jpg

    Solving Cyber Risk: Protecting Your Company and Society

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing