The Challenges of Leveraging Threat Intelligence to Stop Data Breaches

Despite the significant increase in cybersecurity solutions investment, organizations are still plagued by security breaches, especially data breaches. As more organizations experience crippling security breaches, the wave of compromised data is growing significantly. The financial consequences of a...

Full description

Bibliographic Details
Main Authors: Amani Ibrahim, Dhananjay Thiruvady, Jean-Guy Schneider, Mohamed Abdelrazek
Format: Article
Language:English
Published: Frontiers Media S.A. 2020-08-01
Series:Frontiers in Computer Science
Subjects:
Online Access:https://www.frontiersin.org/article/10.3389/fcomp.2020.00036/full
_version_ 1818949602800304128
author Amani Ibrahim
Dhananjay Thiruvady
Jean-Guy Schneider
Mohamed Abdelrazek
author_facet Amani Ibrahim
Dhananjay Thiruvady
Jean-Guy Schneider
Mohamed Abdelrazek
author_sort Amani Ibrahim
collection DOAJ
description Despite the significant increase in cybersecurity solutions investment, organizations are still plagued by security breaches, especially data breaches. As more organizations experience crippling security breaches, the wave of compromised data is growing significantly. The financial consequences of a data breach are set on the rise, but the cost goes beyond potential fines. Data breaches could have a catastrophic impact not only in loss of company's reputation and stock price, but also in economic terms. Threat Intelligence has been recently introduced to enable greater visibility of cyber threats, in order to better protect organizations' digital assets and prevent data breaches. Threat intelligence is the practice of integrating and analyzing disjointed cyber data to extract evidence-based insights regarding an organization's unique threat landscape. This helps explain who the adversary is, how and why they are comprising the organization's digital assets, what consequences could happen following the attack, what assets actually could be compromised, and how to detect or respond to the threat. Every organization is different and threat intelligence frameworks are custom-tailored to the business process itself and the organization's risks, as there is no “one-size-fits-all” in cyber. In this paper, we review the problem of data breaches and discuss the challenges of implementing threat intelligence that scales in today's complex threat landscape and digital infrastructure. This is followed by an illustration of how the future of effective threat intelligence is closely linked to efficiently applying Artificial Intelligence and Machine Learning approaches, and we conclude by outlining future research directions in this area.
first_indexed 2024-12-20T09:05:19Z
format Article
id doaj.art-6f5f971cbbb34aa4a892a7257b2ab8af
institution Directory Open Access Journal
issn 2624-9898
language English
last_indexed 2024-12-20T09:05:19Z
publishDate 2020-08-01
publisher Frontiers Media S.A.
record_format Article
series Frontiers in Computer Science
spelling doaj.art-6f5f971cbbb34aa4a892a7257b2ab8af2022-12-21T19:45:44ZengFrontiers Media S.A.Frontiers in Computer Science2624-98982020-08-01210.3389/fcomp.2020.00036562053The Challenges of Leveraging Threat Intelligence to Stop Data BreachesAmani IbrahimDhananjay ThiruvadyJean-Guy SchneiderMohamed AbdelrazekDespite the significant increase in cybersecurity solutions investment, organizations are still plagued by security breaches, especially data breaches. As more organizations experience crippling security breaches, the wave of compromised data is growing significantly. The financial consequences of a data breach are set on the rise, but the cost goes beyond potential fines. Data breaches could have a catastrophic impact not only in loss of company's reputation and stock price, but also in economic terms. Threat Intelligence has been recently introduced to enable greater visibility of cyber threats, in order to better protect organizations' digital assets and prevent data breaches. Threat intelligence is the practice of integrating and analyzing disjointed cyber data to extract evidence-based insights regarding an organization's unique threat landscape. This helps explain who the adversary is, how and why they are comprising the organization's digital assets, what consequences could happen following the attack, what assets actually could be compromised, and how to detect or respond to the threat. Every organization is different and threat intelligence frameworks are custom-tailored to the business process itself and the organization's risks, as there is no “one-size-fits-all” in cyber. In this paper, we review the problem of data breaches and discuss the challenges of implementing threat intelligence that scales in today's complex threat landscape and digital infrastructure. This is followed by an illustration of how the future of effective threat intelligence is closely linked to efficiently applying Artificial Intelligence and Machine Learning approaches, and we conclude by outlining future research directions in this area.https://www.frontiersin.org/article/10.3389/fcomp.2020.00036/fulldata breachesthreat intelligencedata intelligencemachine learningcybersecurityartificial intelligence
spellingShingle Amani Ibrahim
Dhananjay Thiruvady
Jean-Guy Schneider
Mohamed Abdelrazek
The Challenges of Leveraging Threat Intelligence to Stop Data Breaches
Frontiers in Computer Science
data breaches
threat intelligence
data intelligence
machine learning
cybersecurity
artificial intelligence
title The Challenges of Leveraging Threat Intelligence to Stop Data Breaches
title_full The Challenges of Leveraging Threat Intelligence to Stop Data Breaches
title_fullStr The Challenges of Leveraging Threat Intelligence to Stop Data Breaches
title_full_unstemmed The Challenges of Leveraging Threat Intelligence to Stop Data Breaches
title_short The Challenges of Leveraging Threat Intelligence to Stop Data Breaches
title_sort challenges of leveraging threat intelligence to stop data breaches
topic data breaches
threat intelligence
data intelligence
machine learning
cybersecurity
artificial intelligence
url https://www.frontiersin.org/article/10.3389/fcomp.2020.00036/full
work_keys_str_mv AT amaniibrahim thechallengesofleveragingthreatintelligencetostopdatabreaches
AT dhananjaythiruvady thechallengesofleveragingthreatintelligencetostopdatabreaches
AT jeanguyschneider thechallengesofleveragingthreatintelligencetostopdatabreaches
AT mohamedabdelrazek thechallengesofleveragingthreatintelligencetostopdatabreaches
AT amaniibrahim challengesofleveragingthreatintelligencetostopdatabreaches
AT dhananjaythiruvady challengesofleveragingthreatintelligencetostopdatabreaches
AT jeanguyschneider challengesofleveragingthreatintelligencetostopdatabreaches
AT mohamedabdelrazek challengesofleveragingthreatintelligencetostopdatabreaches