{"id":173013,"date":"2023-09-29T00:23:47","date_gmt":"2023-09-29T05:23:47","guid":{"rendered":"https:\/\/lifeboat.com\/blog\/2023\/09\/threat-data-feeds-and-threat-intelligence-are-not-the-same-thing"},"modified":"2023-09-29T00:23:47","modified_gmt":"2023-09-29T05:23:47","slug":"threat-data-feeds-and-threat-intelligence-are-not-the-same-thing","status":"publish","type":"post","link":"https:\/\/lifeboat.com\/blog\/2023\/09\/threat-data-feeds-and-threat-intelligence-are-not-the-same-thing","title":{"rendered":"Threat Data Feeds and Threat Intelligence Are Not the Same Thing"},"content":{"rendered":"<p><a class=\"aligncenter blog-photo\" href=\"https:\/\/lifeboat.com\/blog.images\/threat-data-feeds-and-threat-intelligence-are-not-the-same-thing.jpg\"><\/a><\/p>\n<p>In cybersecurity, \u201cthreat data feeds\u201d and \u201c<a href=\"https:\/\/www.darkreading.com\/threat-intelligence\" target=\"_blank\">threat intelligence<\/a>\u201d are often used interchangeably. They are, however, quite different. To make matters worse, the term \u201cthreat intelligence\u201d has been co-opted and watered down by vendors, making it even more difficult to define the difference between threat data feeds and threat intelligence.<\/p>\n<p>An easy, and accessible, way to tell the difference is to think about weather forecasts. National TV news shows present a forecast for the entire country. You might get some useful information from this, but usually you just get an idea of what the weather is like nationwide. Local weather, however, drills down into the expected conditions for your specific area \u2014 not only temperature and weather, but also wind speed, barometric pressure, times for weather changes, and so on. You can use this information to plan out your actions for the next few days.<\/p>\n<p>Using the weather forecast analogy, threat data feeds provide a high-level view of the security landscape. For example, it is useful to know that there is a vulnerability in a specific type of software, but it can be relatively trivial if that software is not in use at your organization. Likewise, knowing which threat groups are active is useful information, but how do you know if they are targeting your sector or organization and what processes and tools they are using?<\/p>\n","protected":false},"excerpt":{"rendered":"<p>In cybersecurity, \u201cthreat data feeds\u201d and \u201cthreat intelligence\u201d are often used interchangeably. They are, however, quite different. To make matters worse, the term \u201cthreat intelligence\u201d has been co-opted and watered down by vendors, making it even more difficult to define the difference between threat data feeds and threat intelligence. An easy, and accessible, way to [\u2026]<\/p>\n","protected":false},"author":662,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[34,1694],"tags":[],"class_list":["post-173013","post","type-post","status-publish","format-standard","hentry","category-cybercrime-malcode","category-electronics"],"_links":{"self":[{"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/posts\/173013","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/users\/662"}],"replies":[{"embeddable":true,"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/comments?post=173013"}],"version-history":[{"count":0,"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/posts\/173013\/revisions"}],"wp:attachment":[{"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/media?parent=173013"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/categories?post=173013"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/tags?post=173013"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}