Half of companies prohibit sharing threat intelligence findings with professional communities

Kept under wraps: half of the companies prohibit sharing threat intelligence findings with professional communities

Two-thirds (66%) of threat intelligence (TI) analysts are involved in professional communities, but 52% of all those working in IT and cybersecurity roles are not allowed to share threat intelligence artifacts discovered through those communities, finds a new Kaspersky report, ‘Managing your IT security team’.

Kaspersky is a long-time advocate for international collaboration in cyberspace and contributes to joint initiatives across the global IT security community. The company sees this approach as the best way to protect from ever-evolving cyber threats. As such, Kaspersky surveyed more than 5,200 IT and cybersecurity practitioners globally for this report, to see if other businesses were ready to collaborate and share TI.

The research found that respondents with TI analysis responsibilities, in particular, are likely to participate in specialized forums and blogs (45%), dark web forums (29%) or social media groups (22%).

But when it comes to sharing their own findings, only 44% of respondents have actually made their discoveries public. Conversely, in companies where external sharing is allowed, 77% of security analysts did so. In 8% of cases, security analysts even shared TI findings despite it being prohibited by the organization they work at.

kept-under-wraps-half-of-companies-prohibit-sharing-threat-intelligence-findings-with-professional-communities.jpg

Kaspersky experts noted that such restrictions are partly driven by concerns that if some objects are known publicly before a company can respond to an attack, then cybercriminals may realize that they have been detected and change their tactics. To help IT security teams analyze suspicious objects without a risk of exposing the investigation, Kaspersky provides a private submission mode option through free access to Kaspersky Threat Intelligence Portal. Thanks to this, a cybercriminal will not know that someone has shared samples, and an analyst can still receive the required data.

“Any piece of information – be it new malware or insights on techniques used – is valuable when protecting against advanced threats. That’s why we constantly make our threat research findings available via our information resources and through our TI services. We encourage security analysts to also give a helping hand to others in the same collaborative way,” comments Anatoly Simonenko, Group Manager, Technology Solutions Product Management, at Kaspersky.

The full report is available via the link.

LEAVE A REPLY

Please enter your comment!
Please enter your name here