Security Magazine logo
  • Sign In
  • Create Account
  • Sign Out
  • My Account
  • NEWS
  • MANAGEMENT
  • PHYSICAL
  • CYBER
  • BLOG
  • COLUMNS
  • EXCLUSIVES
  • SECTORS
  • EVENTS
  • MEDIA
  • MORE
  • EMAG
  • SIGN UP!
cart
facebook twitter linkedin youtube
  • NEWS
  • Security Newswire
  • Technologies & Solutions
  • MANAGEMENT
  • Leadership Management
  • Enterprise Services
  • Security Education & Training
  • Logical Security
  • Security & Business Resilience
  • Profiles in Excellence
  • PHYSICAL
  • Access Management
  • Fire & Life Safety
  • Identity Management
  • Physical Security
  • Video Surveillance
  • Case Studies (Physical)
  • CYBER
  • Cybersecurity News
  • More
  • COLUMNS
  • Cyber Tactics
  • Leadership & Management
  • Security Talk
  • Career Intelligence
  • Leader to Leader
  • Cybersecurity Education & Training
  • EXCLUSIVES
  • Annual Guarding Report
  • Most Influential People in Security
  • The Security Benchmark Report
  • The Security Leadership Issue
  • Top Guard and Security Officer Companies
  • Top Cybersecurity Leaders
  • Women in Security
  • SECTORS
  • Arenas / Stadiums / Leagues / Entertainment
  • Banking/Finance/Insurance
  • Construction, Real Estate, Property Management
  • Education: K-12
  • Education: University
  • Government: Federal, State and Local
  • Hospitality & Casinos
  • Hospitals & Medical Centers
  • Infrastructure:Electric,Gas & Water
  • Ports: Sea, Land, & Air
  • Retail/Restaurants/Convenience
  • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
  • Industry Events
  • Webinars
  • Solutions by Sector
  • Security 500 Conference
  • MEDIA
  • Videos
  • Podcasts
  • Polls
  • Photo Galleries
  • Videos
  • Cybersecurity & Geopolitical Discussion
  • Ask Me Anything (AMA) Series
  • MORE
  • Call for Entries
  • Classifieds & Job Listings
  • Continuing Education
  • Newsletter
  • Sponsor Insights
  • Store
  • White Papers
  • EMAG
  • eMagazine
  • This Month's Content
  • Advertise
Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • The Security Leadership Issue
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
Cybersecurity

How security can use deep intelligence to fight cybercrime

By Brian McCann
Fighting cybercrime with deep learning and AI
January 29, 2021

Due to the world’s increasing dependency on digitalization and IoT, cyberthreats have grown at an exponential rate over the last decade. In 2010, there were less than 50 million unique malware executables known to the security community; in 2019 the figure reached 900 million. These attack methods have also become increasingly distributed and sophisticated, making it very difficult for businesses stay secure.

The coronavirus pandemic has only accelerated these problematic trends. Many unprepared organizations were forced to become reliant on digital channels. In addition to managing this pivot, enterprise security and IT teams have been tasked with providing remote access for employees as part of the work-from-home shift earlier in 2020. IT professionals found themselves launching new digital platforms while wrestling with the network changes required to support dated, difficult-to-scale VPN infrastructure.

Given the tight timelines and challenging circumstances, it’s not surprising that many organizations haven’t had the opportunity to properly secure these new online channels or the millions of new home network end points. Unfortunately, cybercriminals have long recognized the opportunity and are taking advantage. A recent report from Neustar showed a 151% increase in the number of DDoS attacks between January and June 2020, compared to the same period in 2019. Security researchers expect this malicious activity to spike during the online retail peak this holiday season.

The need for deep threat intelligence

Conventional methods rely on a few experienced security analysts to handle digital security issues statically. This is simply unsustainable today. Modern cyberattacks are too numerous and complex to repel with a traditional approach. Driven by need, the cybersecurity industry has responded by undergoing a massive technological and operational shift in its practices, with data analysis driving the change.

Cybersecurity professionals have long had the ability to design security mechanisms that automatically respond to threats and mitigate them quickly. The limiting factor, however, is the ability to identify malicious activity in all the noise of daily web traffic. IT teams that diligently track the cybersecurity data generated from network and system sources are typically overwhelmed by the massive amount of information. It has traditionally been difficult to break apart the data to discover insights or implement proper security responses without a lot of effort and time spent by security professionals.

The recent breakthroughs in analytics, machine learning and AI have changed that. With the right tools, security teams have data-driven threat patterns processed and identified, providing more effective, automated security solutions with minimal human intervention. It allows IT teams to focus on strategic responses, make more informed decisions and deliver comprehensive security solutions. There is no way to ensure employees won’t fall for the latest phishing attack, but organizations can decrease the likelihood of attacks with decisioning data that accurately identifies potential threats and prevents access by unauthorized users.

There are several things to keep in mind as cybersecurity team begins creating and building out a threat intelligence capability. Here’s how to make threat data relevant, actionable, and effective for your organization.

Go beyond data to deep intelligence

Many IT teams confuse intelligence with threat data. They aren’t equivalent. Data is just that — a figure or a fact. It doesn’t provide context or risk probability. Effective threat intelligence is evidence-based knowledge that helps cybersecurity team make better decisions and improves responses. Deep intelligence takes it a step further. It uses machine learning and AI to identify attack patterns in huge amounts of unstructured data. Analysis that could take humans decades to understand and process can now be done near instantly with today’s tools, giving IT teams actionable guidance on how to respond to active operational and tactical threats.

Overworked, understaffed teams don’t have the bandwidth to process and act on raw data. Equip teams with deep intelligence so they’re able to keep pace with attackers.

Broaden the intelligence net

Raw data is still necessary to inform these deep insights, however. That means robust internal data capture practices should be in place. Comprehensive records of network event logs and past incident responses, along with information that details network, database, application, and user activity, are all critical to giving machine learning tools the context they need to identify attack patterns.

External threat intelligence is just as critical to organizational security. Third-party threat intelligence can keep IT teams and defenses up to date on the latest security challenges. Combined with behavioral analysis and pattern-based research, third-party threat feeds offer a global view that helps identify and stop bad traffic, both inbound and outbound.

Third-party threat intelligence can also provide insight into the users accessing your company’s digital assets. For example, it’s possible to use IP decisioning data to identify potential threats, as well as identify and prevent access by unauthorized users and prevent potentially fraudulent transactions. There are applications where IP geolocation data can even create a better customer experience by enabling geographically targeted, localized content and reducing friction throughout the customer journey.

Deep intelligence should drive response

Great intelligence is wasted if it’s not acted upon. Too often threat data only succeeds in overwhelming short-staffed IT teams. Make sure the systems and processes are in place to translate information into actions that protect your organization. For many organizations, automation is the solution. Consider direct threat intelligence integrations into security technology. Modern SIEMs, TIPs, Next Gen Firewalls, IPS/IDS, WAFs, and DNS Firewalls can directly integrate third-party threat data to ensure security functions are on guard against the latest cyberattacks.

The case for adopting a deep-intelligence approach to cybersecurity is clear. It’s necessary for keeping pace in the accelerating cybersecurity arms race. Cybersecurity teams can leverage these deep insights to effectively combat today’s kinetic cyberthreat activity and better protect their organizations and customers.

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Brian McCann joined Neustar in October 2019 as Executive Vice President and President of Security Solutions. He is responsible for the vision, strategy, operations and stakeholder satisfaction of the company's cloud-based and data-driven security solutions business including Neustar's industry leading application security, DNS, security intelligence and website performance management offerings. Brian has more than 25 years of executive leadership experience in high-growth security and technology businesses. Prior to Neustar, he served as the President of the Security Solutions business unit at NETSCOUT Systems. Brian was also the CEO of ONPATH Technologies and sold the company to NETSCOUT in 2012. Prior to that, he was the Founding President of ADVA Optical Networking USA and earlier in his career he was in marketing and sales at 3M. Brian received a Bachelor of Science degree in Engineering from Rutgers University.

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Security's Top Cybersecurity Leaders 2024

    Security's Top Cybersecurity Leaders 2024

    Security magazine's Top Cybersecurity Leaders 2024 award...
    Top Cybersecurity Leaders
    By: Security Staff
  • cyber brain

    The intersection of cybersecurity and artificial intelligence

    Artificial intelligence (AI) is a valuable cybersecurity...
    Columns
    By: Pam Nigro
  • artificial intelligence AI graphic

    Assessing the pros and cons of AI for cybersecurity

    Artificial intelligence (AI) has significant implications...
    Cybersecurity
    By: Charles Denyer
Subscribe For Free!
  • Security eNewsletter & Other eNews Alerts
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

Middle East Escalation, Humanitarian Law and Disinformation – Episode 25

Middle East Escalation, Humanitarian Law and Disinformation – Episode 25

Security’s Top 5 – 2024 Year in Review

Security’s Top 5 – 2024 Year in Review

The Money Laundering Machine: Inside the global crime epidemic - Episode 24

The Money Laundering Machine: Inside the global crime epidemic - Episode 24

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • Crisis Response Team
    Sponsored byEverbridge

    Automate or Fall Behind – Crisis Response at the Speed of Risk

  • Perimeter security
    Sponsored byAMAROK

    Why Property Security is the New Competitive Advantage

  • Duty of Care
    Sponsored byAMAROK

    Integrating Technology and Physical Security to Advance Duty of Care

Popular Stories

White post office truck

Department of Labor Sues USPS Over Texas Whistleblower Termination

Internal computer parts

Critical Software Vulnerabilities Rose 37% in 2024

Coding

AI Emerges as the Top Concern for Security Leaders

Person working on laptop

Governance in the Age of Citizen Developers and AI

patient at healthcare reception desk

Almost Half of Healthcare Breaches Involved Microsoft 365

2025 Security Benchmark banner

Events

June 24, 2025

Inside a Modern GSOC: How Anthropic Benchmarks Risk Detection Tools for Speed and Accuracy

For today's security teams, making informed decisions in the first moments of a crisis is critical.

August 27, 2025

Risk Mitigation as a Competitive Edge

In today’s volatile environment, a robust risk management strategy isn’t just a requirement—it’s a foundation for organizational resilience. From cyber threats to climate disruptions, the ability to anticipate, withstand, and adapt to disruption is becoming a hallmark of industry leaders.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • data privacy

    What IT leaders can learn from the internet’s surprising resilience during COVID-19

    See More
  • hacker- enews

    How Business Leaders Can Fight COVID-19-Related Cybercrime

    See More
  • Piggy bank tipped over

    How to use artificial intelligence to keep financial data safe

    See More

Related Products

See More Products
  • security culture.webp

    Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

  • school security.jpg

    School Security: How to Build and Strengthen a School Safety Program

  • 150952519X.jpg

    Intelligence in An Insecure World, 3rd Edition

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • eNewsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing

Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • The Security Leadership Issue
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!