Connect with us

Hi, what are you looking for?

HEADLINES

Half of companies prohibit sharing threat intelligence findings with professional communities – Kaspersky

The research found that respondents with TI analysis responsibilities, in particular, are likely to participate in specialized forums and blogs (45%), dark web forums (29%) or social media groups (22%).

Two-thirds (66%) of threat intelligence (TI) analysts are involved in professional communities, but 52% of all those working in IT and cybersecurity roles are not allowed to share threat intelligence artifacts discovered through those communities, finds a new Kaspersky report, “Managing your IT security team”. 

Kaspersky is a long-time advocate for international collaboration in cyberspace and contributes to joint initiatives across the global IT security community. The company sees this approach as the best way to protect from ever-evolving cyberthreats. As such, Kaspersky surveyed more than 5,200 IT and cybersecurity practitioners globally for this report, to see if other businesses were ready to collaborate and share TI.

The research found that respondents with TI analysis responsibilities, in particular, are likely to participate in specialized forums and blogs (45%), dark web forums (29%) or social media groups (22%). 

But when it comes to sharing their own findings, only 44% of respondents have actually made their discoveries public. Conversely, in companies where external sharing is allowed, 77% of security analysts did so. In 8% of cases, security analysts even shared TI findings despite it being prohibited by the organization they work at. 

Advertisement. Scroll to continue reading.

Kaspersky experts noted that such restrictions are partly driven by concerns that if some objects are known publicly before a company can respond to an attack, then cybercriminals may realize that they have been detected and change their tactics. To help IT security teams analyze suspicious objects without the risk of exposing the investigation, Kaspersky provides a private submission mode option through free access to Kaspersky Threat Intelligence Portal. Thanks to this, a cybercriminal will not know that someone has shared samples, and an analyst can still receive the required data.

“Any piece of information – be it new malware or insights on techniques used – is valuable when protecting against advanced threats. That’s why we constantly make our threat research findings available via our information resources and through our TI services. We encourage security analysts to also give a helping hand to others in the same collaborative way,” comments Anatoly Simonenko, Group Manager, Technology Solutions Product Management, at Kaspersky. 

Advertisement
Advertisement
Advertisement

Like Us On Facebook

You May Also Like

ELECTRONICS

Philips EasyKey partnered with Megaworld and equipped their world-class properties with only the best-in-class smart locks we have on offer, the Philips EasyKey 9300.

HEADLINES

The PLDT wireless unit is also calling on customers to report these messages to Smart’s HULISCAM portal for further action.

HEADLINES

Here are some tips from Sophos for staying secure online during the cybersecurity awareness month.

HEADLINES

While only 21% of hackers believed that AI technologies enhance the value of hacking in 2023, 71% reported it to have value in 2024....

HEADLINES

Kaspersky has enhanced its Kaspersky Industrial CyberSecurity (KICS), a native XDR Platform for industrial enterprises, and streamlined Managed Detection and Response (MDR) for Industrial...

White Papers

One in three industrial companies encounter regular network problems, with 45% of businesses experiencing them a few times a month, while only 12% of...

HEADLINES

Smart has received reports about unscrupulous individuals pretending to be company executives or representatives of organizations asking for donations for made-up or nonexistent relief...

HEADLINES

Located in the Kaspersky office, the new facility will provide the company’s stakeholders with services ranging from an overview of Kaspersky’s practices, to a...

Advertisement