Search
00
GBAF Logo
trophy
Top StoriesInterviewsBusinessFinanceBankingTechnologyInvestingTradingVideosAwardsMagazinesHeadlinesTrends

Subscribe to our newsletter

Get the latest news and updates from our team.

Global Banking and Finance Review

Global Banking & Finance Review

Company

    GBAF Logo
    • About Us
    • Profile
    • Privacy & Cookie Policy
    • Terms of Use
    • Contact Us
    • Advertising
    • Submit Post
    • Latest News
    • Research Reports
    • Press Release
    • Awards▾
      • About the Awards
      • Awards TimeTable
      • Submit Nominations
      • Testimonials
      • Media Room
      • Award Winners
      • FAQ
    • Magazines▾
      • Global Banking & Finance Review Magazine Issue 79
      • Global Banking & Finance Review Magazine Issue 78
      • Global Banking & Finance Review Magazine Issue 77
      • Global Banking & Finance Review Magazine Issue 76
      • Global Banking & Finance Review Magazine Issue 75
      • Global Banking & Finance Review Magazine Issue 73
      • Global Banking & Finance Review Magazine Issue 71
      • Global Banking & Finance Review Magazine Issue 70
      • Global Banking & Finance Review Magazine Issue 69
      • Global Banking & Finance Review Magazine Issue 66
    Top StoriesInterviewsBusinessFinanceBankingTechnologyInvestingTradingVideosAwardsMagazinesHeadlinesTrends

    Global Banking & Finance Review® is a leading financial portal and online magazine offering News, Analysis, Opinion, Reviews, Interviews & Videos from the world of Banking, Finance, Business, Trading, Technology, Investing, Brokerage, Foreign Exchange, Tax & Legal, Islamic Finance, Asset & Wealth Management.
    Copyright © 2010-2025 GBAF Publications Ltd - All Rights Reserved.

    ;
    Editorial & Advertiser disclosure

    Global Banking and Finance Review is an online platform offering news, analysis, and opinion on the latest trends, developments, and innovations in the banking and finance industry worldwide. The platform covers a diverse range of topics, including banking, insurance, investment, wealth management, fintech, and regulatory issues. The website publishes news, press releases, opinion and advertorials on various financial organizations, products and services which are commissioned from various Companies, Organizations, PR agencies, Bloggers etc. These commissioned articles are commercial in nature. This is not to be considered as financial advice and should be considered only for information purposes. It does not reflect the views or opinion of our website and is not to be considered an endorsement or a recommendation. We cannot guarantee the accuracy or applicability of any information provided with respect to your individual or personal circumstances. Please seek Professional advice from a qualified professional before making any financial decisions. We link to various third-party websites, affiliate sales networks, and to our advertising partners websites. When you view or click on certain links available on our articles, our partners may compensate us for displaying the content to you or make a purchase or fill a form. This will not incur any additional charges to you. To make things simpler for you to identity or distinguish advertised or sponsored articles or links, you may consider all articles or links hosted on our site as a commercial article placement. We will not be responsible for any loss you may suffer as a result of any omission or inaccuracy on the website.

    Home > Technology > How to defeat cyber threats with AI-powered, real time threat intelligence
    Technology

    How to defeat cyber threats with AI-powered, real time threat intelligence

    How to defeat cyber threats with AI-powered, real time threat intelligence

    Published by Jessica Weisman-Pitts

    Posted on September 13, 2021

    Featured image for article about Technology

    By Milad Aslaner, Senior Director, Cyber Defense Strategy, SentinelOne

    For many Security Operations Centre (SOC) teams, defending against cyberattacks is largely reactive, as they confront increasingly complex threats and widening attack surfaces, resulting from remote working and a vast array of cloud applications that provide unauthorised users with a myriad of system-access points.

    While a swift and thorough response to security incidents is key, it is also essential to understand the bigger picture as to how, when, and why an incident occurred. Responding to a threat without viewing it holistically can lead to an infinite loop, where we contain a threat only to wait for an adversary to leverage the same attack methodology again.

    Unfortunately, the moment you begin to contain a threat, your actions may set off alarm bells for threat actors, triggering them to accelerate their attack or stealthily change techniques. For this reason, it’s critical for SOC teams to spend time analysing how, when, and why an incident occurs.

    Importance of cyber threat intelligence

    Cyber threat intelligence (CTI) consists of information on the tactics, techniques, and procedures (TTP) of adversaries, and it enables organisations to make more informed and data-driven decisions about their cybersecurity programmes, driving more successful protection and detection of – and response to – today’s cyberattacks.

    As Gartner affirms, “[e]vidence-based knowledge, including context, mechanisms, indicators, implications and actionable advice about an existing or emerging menace or hazard to assets…can be used to inform decisions regarding the subject’s response to that menace or hazard.”

    CTI helps organisations recognise blind spots, providing SOC teams with valuable insights into the threat landscape that ultimately allow them to mitigate risk. By applying threat intelligence to identifying and understanding the relationship between adversaries and their TTP (tactics, techniques and procedures), security analysts are empowered to take the most effective proactive steps for their particular environment.

    Threat Intelligence challenges facing organisations today

    The cyber threat landscape continues to evolve, with attacks like the DarkSide ransomware campaign against Colonial Pipeline – causing the shutdown of the American oil company’s pipeline and the payment of about $5 million in ransom – and SUNBURST, the malware variant behind the SolarWinds corporate attack that compromised the data of more than 30,000 public and private organisations, just the tip of the cyberattack iceberg.

    In recent years, hoping to better prepare for emerging threats and take informed action, many companies have attempted to leverage cyber threat intelligence. However, in practice, SOC teams often aren’t seeing tangible results. According to Information Security Forum’s research, 82% of their members have cyber threat intelligence capability, with the remaining 18% planning to implement one, yet only 25% of those members believe their current capability achieves their desired objectives.

    This is largely due to the common pitfalls of modern threat intelligence, such as the inability to effectively process, correlate, and analyse data, given the enormous volume of data from signals and telemetry, which collects measurements or other information at remote points and automatically transmits it to receiving equipment. Most threat intelligence solutions depend heavily on human intervention to consolidate, parse, enrich, and validate data, and their analyses can focus too deeply on who the attackers are, versus how to remediate and take action.

    Another issue is that threat-intelligence sources are often siloed, and teams lack the right technology and processes to connect and correlate their data for a more complete picture. Consequently, it has become costly and time-consuming to operationalise CTI, with threat researchers struggling to separate the meaningful insight from the noise.

    Leveraging AI for threat intelligence

    With incident queues continually growing, it’s no surprise that response-time metrics like ‘mean time to detect’ (MTTD) and ‘mean time to respond’ (MTTR) are rising. Given that one of the biggest obstacles to performing these types of in-depth analyses is time and resources, the key question is how organisations can acquire and evaluate the intelligence they need, without adding even more work to an already overloaded team.

    One of the most effective ways to realise the full value of cyber threat intelligence is to combine the best of artificial intelligence with human intelligence. Doing so resolves two primary pain points: the amount of data that requires manual processing and the time it takes to manually correlate and contextualise it.

    By utilising AI-powered autonomous security tools, security professionals can offload a great deal of labour-intensive, manual work they previously struggled to keep up with. These AI-driven platforms can perform TTP (tactics, techniques, and procedures) analysis and correlate incoming threats at scale and in real time.

    Some platforms even provide a console from which SOC teams can investigate a particular incident, accessing information on when a threat was first seen, when it was last seen, and the scope of the breach. Such platforms can also quickly identify the type of threat, for instance, a ransomware campaign, and even provide insights on how each of the adversary’s steps maps to the TTP of the MITRE ATT&CK framework, which is a globally-accessible knowledge base of adversary tactics and techniques based on real-world experiences that enables the development of crowd-sourced cybersecurity defences.

    Conclusion

    Cyber attackers are employing novel and ever-more sophisticated techniques to infiltrate networks and systems, and most security teams today are simply too overloaded to perform in-depth, meaningful analyses for all of their incident investigations. But with the help of AI-driven autonomous tools, SOC teams can now access real-time threat modelling, incident correlation, and TTP analysis at scale, empowering human threat analysts to make informed, data-backed decisions. This combination of artificial and human intelligence provides context, enrichment, and actionability to cyber data, and allows organisations to take a more automated and proactive approach to their defences – not only keeping up with your attackers but even staying one step ahead.

    Related Posts
    LakeFusion Secures Seed Funding to Advance AI-Native Master Data Management
    LakeFusion Secures Seed Funding to Advance AI-Native Master Data Management
    Clarity, Context, Confidence: Explainable AI and the New Era of Investor Trust
    Clarity, Context, Confidence: Explainable AI and the New Era of Investor Trust
    Data Intelligence Transforms the Future of Credit Risk Strategy
    Data Intelligence Transforms the Future of Credit Risk Strategy
    Architect of Integration Ushers in a New Era for AI in Regulated Industries
    Architect of Integration Ushers in a New Era for AI in Regulated Industries
    How One Technologist is Building Self-Healing AI Systems that Could Transform Financial Regulation
    How One Technologist is Building Self-Healing AI Systems that Could Transform Financial Regulation
    SBS is Doubling Down on SaaS to Power the Next Wave of Bank Modernization
    SBS is Doubling Down on SaaS to Power the Next Wave of Bank Modernization
    Trust Embedding: Integrating Governance into Next-Generation Data Platforms
    Trust Embedding: Integrating Governance into Next-Generation Data Platforms
    The Guardian of Connectivity: How Rohith Kumar Punithavel Is Redefining Trust in Private Networks
    The Guardian of Connectivity: How Rohith Kumar Punithavel Is Redefining Trust in Private Networks
    BNY Partners With HID and SwiftConnect to Provide Mobile Access to its Offices Around the Globe With Employee Badge in Apple Wallet
    BNY Partners With HID and SwiftConnect to Provide Mobile Access to its Offices Around the Globe With Employee Badge in Apple Wallet
    How Integral’s CTO Chidambaram Bhat is helping to solve  transfer pricing problems through cutting edge AI.
    How Integral’s CTO Chidambaram Bhat is helping to solve transfer pricing problems through cutting edge AI.
    Why Physical Infrastructure Still Matters in a Digital Economy
    Why Physical Infrastructure Still Matters in a Digital Economy
    Why Compliance Has Become an Engineering Problem
    Why Compliance Has Become an Engineering Problem

    Why waste money on news and opinions when you can access them for free?

    Take advantage of our newsletter subscription and stay informed on the go!

    Subscribe

    Previous Technology PostContactless Mobile Ordering: How venues can upgrade and boost sales
    Next Technology PostWhat are the benefits of open-source technologies for fintech?

    More from Technology

    Explore more articles in the Technology category

    Can AI-Powered Security Prevent $4.2 Billion in Banking Fraud?

    Can AI-Powered Security Prevent $4.2 Billion in Banking Fraud?

    Reimagining Human-Technology Interaction: Sagar Kesarpu’s Mission to Humanize Automation

    Reimagining Human-Technology Interaction: Sagar Kesarpu’s Mission to Humanize Automation

    LeapXpert: How financial institutions can turn shadow messaging from a risk into an opportunity

    LeapXpert: How financial institutions can turn shadow messaging from a risk into an opportunity

    Intelligence in Motion: Building Predictive Systems for Global Operations

    Intelligence in Motion: Building Predictive Systems for Global Operations

    Predictive Analytics and Strategic Operations: Strengthening Supply Chain Resilience

    Predictive Analytics and Strategic Operations: Strengthening Supply Chain Resilience

    How Nclude.ai   turned broken portals into completed applications

    How Nclude.ai turned broken portals into completed applications

    The Silent Shift: Rethinking Services for a Digital World?

    The Silent Shift: Rethinking Services for a Digital World?

    Culture as Capital: How Woxa Corporation Is Redefining Fintech Sustainability

    Culture as Capital: How Woxa Corporation Is Redefining Fintech Sustainability

    Securing the Future: We're Fixing Cyber Resilience by Finally Making Compliance Cool

    Securing the Future: We're Fixing Cyber Resilience by Finally Making Compliance Cool

    Supply chain security risks now innumerable and unmanageable for majority of cybersecurity leaders, IO research reveals

    Supply chain security risks now innumerable and unmanageable for majority of cybersecurity leaders, IO research reveals

    Why AI's Promise of Efficiency May Break Tomorrow's Workforce

    Why AI's Promise of Efficiency May Break Tomorrow's Workforce

    Revolutionizing AppSec: The AI Security Crew Paradigm Shift

    Revolutionizing AppSec: The AI Security Crew Paradigm Shift

    View All Technology Posts