The Challenges of Leveraging Threat Intelligence to Stop Data Breaches
Despite the significant increase in cybersecurity solutions investment, organizations are still plagued by security breaches, especially data breaches. As more organizations experience crippling security breaches, the wave of compromised data is growing significantly. The financial consequences of a...
Main Authors: | , , , |
---|---|
Format: | Article |
Language: | English |
Published: |
Frontiers Media S.A.
2020-08-01
|
Series: | Frontiers in Computer Science |
Subjects: | |
Online Access: | https://www.frontiersin.org/article/10.3389/fcomp.2020.00036/full |
_version_ | 1818949602800304128 |
---|---|
author | Amani Ibrahim Dhananjay Thiruvady Jean-Guy Schneider Mohamed Abdelrazek |
author_facet | Amani Ibrahim Dhananjay Thiruvady Jean-Guy Schneider Mohamed Abdelrazek |
author_sort | Amani Ibrahim |
collection | DOAJ |
description | Despite the significant increase in cybersecurity solutions investment, organizations are still plagued by security breaches, especially data breaches. As more organizations experience crippling security breaches, the wave of compromised data is growing significantly. The financial consequences of a data breach are set on the rise, but the cost goes beyond potential fines. Data breaches could have a catastrophic impact not only in loss of company's reputation and stock price, but also in economic terms. Threat Intelligence has been recently introduced to enable greater visibility of cyber threats, in order to better protect organizations' digital assets and prevent data breaches. Threat intelligence is the practice of integrating and analyzing disjointed cyber data to extract evidence-based insights regarding an organization's unique threat landscape. This helps explain who the adversary is, how and why they are comprising the organization's digital assets, what consequences could happen following the attack, what assets actually could be compromised, and how to detect or respond to the threat. Every organization is different and threat intelligence frameworks are custom-tailored to the business process itself and the organization's risks, as there is no “one-size-fits-all” in cyber. In this paper, we review the problem of data breaches and discuss the challenges of implementing threat intelligence that scales in today's complex threat landscape and digital infrastructure. This is followed by an illustration of how the future of effective threat intelligence is closely linked to efficiently applying Artificial Intelligence and Machine Learning approaches, and we conclude by outlining future research directions in this area. |
first_indexed | 2024-12-20T09:05:19Z |
format | Article |
id | doaj.art-6f5f971cbbb34aa4a892a7257b2ab8af |
institution | Directory Open Access Journal |
issn | 2624-9898 |
language | English |
last_indexed | 2024-12-20T09:05:19Z |
publishDate | 2020-08-01 |
publisher | Frontiers Media S.A. |
record_format | Article |
series | Frontiers in Computer Science |
spelling | doaj.art-6f5f971cbbb34aa4a892a7257b2ab8af2022-12-21T19:45:44ZengFrontiers Media S.A.Frontiers in Computer Science2624-98982020-08-01210.3389/fcomp.2020.00036562053The Challenges of Leveraging Threat Intelligence to Stop Data BreachesAmani IbrahimDhananjay ThiruvadyJean-Guy SchneiderMohamed AbdelrazekDespite the significant increase in cybersecurity solutions investment, organizations are still plagued by security breaches, especially data breaches. As more organizations experience crippling security breaches, the wave of compromised data is growing significantly. The financial consequences of a data breach are set on the rise, but the cost goes beyond potential fines. Data breaches could have a catastrophic impact not only in loss of company's reputation and stock price, but also in economic terms. Threat Intelligence has been recently introduced to enable greater visibility of cyber threats, in order to better protect organizations' digital assets and prevent data breaches. Threat intelligence is the practice of integrating and analyzing disjointed cyber data to extract evidence-based insights regarding an organization's unique threat landscape. This helps explain who the adversary is, how and why they are comprising the organization's digital assets, what consequences could happen following the attack, what assets actually could be compromised, and how to detect or respond to the threat. Every organization is different and threat intelligence frameworks are custom-tailored to the business process itself and the organization's risks, as there is no “one-size-fits-all” in cyber. In this paper, we review the problem of data breaches and discuss the challenges of implementing threat intelligence that scales in today's complex threat landscape and digital infrastructure. This is followed by an illustration of how the future of effective threat intelligence is closely linked to efficiently applying Artificial Intelligence and Machine Learning approaches, and we conclude by outlining future research directions in this area.https://www.frontiersin.org/article/10.3389/fcomp.2020.00036/fulldata breachesthreat intelligencedata intelligencemachine learningcybersecurityartificial intelligence |
spellingShingle | Amani Ibrahim Dhananjay Thiruvady Jean-Guy Schneider Mohamed Abdelrazek The Challenges of Leveraging Threat Intelligence to Stop Data Breaches Frontiers in Computer Science data breaches threat intelligence data intelligence machine learning cybersecurity artificial intelligence |
title | The Challenges of Leveraging Threat Intelligence to Stop Data Breaches |
title_full | The Challenges of Leveraging Threat Intelligence to Stop Data Breaches |
title_fullStr | The Challenges of Leveraging Threat Intelligence to Stop Data Breaches |
title_full_unstemmed | The Challenges of Leveraging Threat Intelligence to Stop Data Breaches |
title_short | The Challenges of Leveraging Threat Intelligence to Stop Data Breaches |
title_sort | challenges of leveraging threat intelligence to stop data breaches |
topic | data breaches threat intelligence data intelligence machine learning cybersecurity artificial intelligence |
url | https://www.frontiersin.org/article/10.3389/fcomp.2020.00036/full |
work_keys_str_mv | AT amaniibrahim thechallengesofleveragingthreatintelligencetostopdatabreaches AT dhananjaythiruvady thechallengesofleveragingthreatintelligencetostopdatabreaches AT jeanguyschneider thechallengesofleveragingthreatintelligencetostopdatabreaches AT mohamedabdelrazek thechallengesofleveragingthreatintelligencetostopdatabreaches AT amaniibrahim challengesofleveragingthreatintelligencetostopdatabreaches AT dhananjaythiruvady challengesofleveragingthreatintelligencetostopdatabreaches AT jeanguyschneider challengesofleveragingthreatintelligencetostopdatabreaches AT mohamedabdelrazek challengesofleveragingthreatintelligencetostopdatabreaches |