EDITOR ’ S question
DAN BRIDGES , TECHNICAL DIRECTOR – INTERNATIONAL CYWARE
etailers collect and store vast
R quantities of data , much of it being sensitive customer data like credit card details or personally identifiable information ( PPI ) – a treasure trove for attackers . Malicious actors often target businesses at their busiest , like during Black Friday , Cyber Monday and the holiday shopping season .
Last year , 41 % of retail cyberattacks stemmed from vulnerabilities and another 22 % from compromised credentials , therefore security measures must be as robust as possible as retailers prepare for seasonal traffic surges . However , according to Gartner , many organisations lack an understanding of their threat landscape .
Threat intelligence helps enterprises get ahead of attacks , but it isn ’ t easy to segregate , correlate and prioritise the huge volumes of available threat data to create a ‘ single source of truth .’ Adding threat intelligence , however , isn ’ t enough . We must connect the dots . This next-generation approach to cybersecurity – often referred to as cyber fusion – unifies all security functions such as threat
Last year , 41 % of retail cyberattacks stemmed from vulnerabilities and another 22 % from compromised credentials .
Threat intelligence only works when it can communicate the relevant data to the right people , at the right time .
intelligence , security automation , threat response , security orchestration , incident response and others into a single connected platform which detects , manages and responds to threats in an integrated and collaborative manner .
The importance of collaboration – inside and outside the organisation – cannot be overstated either . Collective defence focuses on an open , trusted ecosystem where security teams are empowered to work much more closely with trusted community peers as they manage intelligence , develop detections and response plans , and respond to threats .
At the end of the day , threat intelligence only works when it can communicate the relevant data to the right people , at the right time , so they can quickly take meaningful action . As has been written about many times over , there is no silver bullet when tackling cybercrime – whether it ’ s a genuine mistake or a deliberate , targeted attack – but by fusing disparate elements of the cybersecurity stack , the risk of falling victim will be reduced .
30 WWW . INTELLIGENTCISO . COM