The Time for Threat Intelligence-Driven Cybersecurity is Now.

The dramatic escalation of events in recent days, between the U.S. and Iran, has prompted the U.S. Department of Homeland Security to release an official warning to organizations.
In its first official guidance since the U.S. authorized drone attack against Iran, the Cybersecurity and Infrastructure Security Agency (CISA) has warned organizations to “consider and assess the possible impacts and threat of cyberattack on their businesses.” This includes the risk of an Iran cyber attack.
The brief goes on to say that Iran and its allies could launch “disruptive and destructive cyber operations” against strategic targets including financial, utility, and energy companies, as well as transit systems.
CISA also warned of potential disinformation campaigns and kinetic attacks – including bombings, and advised companies to take necessary precautions, including off-line backups of critical data and systems. To be clear, Iran has been carrying out state-sponsored attacks on the U.S. for a while.
2012 and 2013 saw a series of denial-of-service attacks against Bank of America, the New York Stock Exchange, and NASDAQ that were attributed to Iran. Additionally, Iran attributed as the source of an attack on the Sands Casino in Las Vegas, which shut down all operations.
In short, Iran has been and will continue to be a cyber threat to the U.S. While this won’t change, what changes constantly is the level of risk. It’s dynamic. In fact, this illustrates a great point with respect to cyber threats in general.
Cyber-attacks are highly dynamic in terms of the level of risk, identity of the attackers, attack targets, and the infrastructure being used to launch attacks.
This makes it critical for organizations to incorporate a broad-based view of threat intelligence from multiple sources in order to increase visibility into threats, improve cyber defenses, and reduce risk.
Now more than ever, threat intelligence-driven cybersecurity is critical to protecting our economy, our infrastructure, and our institutions. Specific to the current threat from Iran, here’s three major ways you can leverage threat intelligence to reduce the risk.
Now’s a great time to revisit GEO-IP policies for network access and increase monitoring efforts. One easy way you can reduce risk is to block or become more restrictive on network traffic originating from or going to Iran (and other hostile countries that represent an Iranian proxy risk). Now, we know that GEO-IP controls are not a panacea, and have challenges on two main fronts:
Today’s elite cybersecurity organizations utilize a broad mix of threat intelligence in order to keep up with today’s highly dynamic threat landscape.
These organizations have realized that the single-source threat intelligence that is powering their existing network security controls (like next-generation firewalls and intrusion detection & prevention systems) is not enough to keep up with today’s threats.
A broader view of threat intelligence that spans commercial, open source, industry, and government sources is required. This broader view of threat intelligence will complement your GEO-IP efforts and help protect you against malware, phishing, ransomware attacks and communications with malicious command and control infrastructure associated with these attacks.
We recommend expanding your threat intelligence sources, specifically:
Finally, it is important to keep in mind that consuming threat intelligence is the first step in greatly reducing risk, however, sharing threat intelligence is equally important. “If you see something, say something” as information sharing will be critical to ensuring a holistic and concerted defense against Iran.
Expanding your use of threat intelligence is important, but only by acting on threat intelligence will you achieve its full value, – reducing the risk of attack and protection of your business.
For example, knowing that certain IP and domain indicators-of-compromise (IoCs) are malicious is great but if you aren’t proactively blocking these malicious indicators, or at least gaining visibility into whether these IoCs are hitting your network, then what’s the point?
An excellent example of taking action with threat intelligence is to implement broad-based, real-time, threat intelligence filtering of network traffic. Adding this as a critical component of your security practice, can help you improve the security of your network and your visibility into threats.
Threater helps organizations protect their networks by making threat intelligence actionable. Our cloud-based Threat Intelligence Protection platform aggregates threat intelligence from multiple sources, integrates threat intelligence from any source in real time, and takes action on threat intelligence in an easy, open, automated, and scalable away.
As a critical component of our Threat Intelligence Protection platform, the Threater Threat Intelligence Gateway provides scalable and automated threat intelligence-filtering of network traffic as well as easy-to-use GEO-IP filtering capabilities.
Organizations are using Threater’s solution to strengthen network protection, reduce manual staff workload and increase ROI on existing security investments including multi-source threat intelligence and next-generation firewalls.
Interested in learning more? Sign up for a free 30-day trial or a demo!
For More Information:
Threat Intelligence Challenges with Next-Generation Firewalls
The Threater Threat Intelligence Platform Datasheet
Links