{"id":80732,"date":"2018-07-18T09:43:01","date_gmt":"2018-07-18T16:43:01","guid":{"rendered":"https:\/\/lifeboat.com\/blog\/2018\/07\/how-to-structure-an-enterprise-wide-threat-intelligence-strategy"},"modified":"2018-07-18T09:43:01","modified_gmt":"2018-07-18T16:43:01","slug":"how-to-structure-an-enterprise-wide-threat-intelligence-strategy","status":"publish","type":"post","link":"https:\/\/lifeboat.com\/blog\/2018\/07\/how-to-structure-an-enterprise-wide-threat-intelligence-strategy","title":{"rendered":"How to Structure an Enterprise-Wide Threat Intelligence Strategy"},"content":{"rendered":"<p style=\"padding-right: 20px\"><a class=\"aligncenter blog-photo\" href=\"https:\/\/lifeboat.com\/blog.images\/logo.how-to-structure-an-enterprise-wide-threat-intelligence-strategy2.jpg\"><\/a><\/p>\n<p>To keep an organization safe, you must think about the entire IT ecosystem.<\/p>\n<p>The ever-expanding range and diversity of cyber threats make it difficult for organizations to prioritize their offensive and defensive strategies against attackers. From malware, ransomware, and other attacks coming from the outside, to insider threats and system vulnerabilities from within, today\u2019s expanded attack surfaces cut across the whole enterprise landscape \u2014 and that means an enterprise\u2019s threat intelligence strategy must address the <em>entire<\/em> IT ecosystem.<\/p>\n<p>To be effective, threat intelligence must be proactive, comprehensive, and done in a way that doesn\u2019t inadvertently create more risk. Unfortunately, as a recent <a href=\"http:\/\/www.marketwired.com\/press-release\/second-annual-ponemon-report-finds-threat-intelligence-critical-strong-security-posture-2233632.htm\" target=\"_blank\">Ponemon survey<\/a> illustrates, most organizations fall short of this goal \u2014 tripped up by a range of challenges, including a lack of expertise and overwhelming volumes of data. Improved threat intelligence comes from improving the strategy, techniques, and tools employed by enterprises to probe their networks for weakness and shore up defenses and resiliency.<\/p>\n<p><!-- Link: <a href=\"https:\/\/www.darkreading.com\/threat-intelligence\/how-to-structure-an-enterprise-wide-threat-intelligence-strategy\/a\/d-id\/1332244\">https:\/\/www.darkreading.com\/threat-intelligence\/how-to-struc...id\/1332244<\/a> --><\/p>\n","protected":false},"excerpt":{"rendered":"<p>To keep an organization safe, you must think about the entire IT ecosystem. The ever-expanding range and diversity of cyber threats make it difficult for organizations to prioritize their offensive and defensive strategies against attackers. From malware, ransomware, and other attacks coming from the outside, to insider threats and system vulnerabilities from within, today\u2019s expanded [\u2026]<\/p>\n","protected":false},"author":396,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[34],"tags":[],"class_list":["post-80732","post","type-post","status-publish","format-standard","hentry","category-cybercrime-malcode"],"_links":{"self":[{"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/posts\/80732","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/users\/396"}],"replies":[{"embeddable":true,"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/comments?post=80732"}],"version-history":[{"count":0,"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/posts\/80732\/revisions"}],"wp:attachment":[{"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/media?parent=80732"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/categories?post=80732"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/tags?post=80732"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}