Nearly half of companies in META prohibit sharing threat intelligence findings
Complex Made Simple

Nearly half of companies in META prohibit sharing threat intelligence findings

Nearly half of companies in META prohibit sharing threat intelligence findings

Kaspersky surveyed more than 5,200 IT and cybersecurity practitioners globally for this report to see if other businesses were ready to collaborate and share threat intelligence

  • 44% of all those working in IT and cybersecurity roles are not allowed to share threat intelligence
  • In 8% of cases, security analysts shared TI findings despite it being prohibited
  • If some objects are known publicly, concerns are that cyber criminals may change their tactics

Two-thirds (69%) of threat intelligence (TI) analysts in the META region are involved in professional communities, but 44% of all those working in IT and cybersecurity roles are not allowed to share threat intelligence artifacts discovered through those communities, finds a new Kaspersky report titled, ‘Managing your IT security team’. 

Kaspersky is a long-time advocate for international collaboration in cyberspace and contributes to joint initiatives across the global IT security community. The company sees this approach as the best way to protect from ever-evolving cyber threats. As such, Kaspersky surveyed more than 5,200 IT and cybersecurity practitioners globally for this report to see if other businesses were ready to collaborate and share TI.

The research found that respondents with TI analysis responsibilities, in particular, are likely to participate in specialized forums and blogs (48%), dark web forums (32%) or social media groups (28%). 

But when it comes to sharing their own findings, only (49%) of respondents have actually made their discoveries public. Conversely, in companies where external sharing is allowed, (81%) of security analysts did so. In 8% of cases, security analysts even shared TI findings despite it being prohibited by the organization they work at. 

Kaspersky experts noted that such restrictions are partly driven by concerns that if some objects are known publicly before a company can respond to an attack, then cyber criminals may realize that they have been detected and change their tactics. To help IT security teams analyze suspicious objects without the risk of exposing the investigation, Kaspersky provides a private submission mode option through free access to Kaspersky Threat Intelligence Portal. Thanks to this, a cybercriminal will not know that someone has shared samples, and an analyst can still receive the required data.

“Any piece of information – be it new malware or insights on techniques used – is valuable when protecting against advanced threats. That’s why we constantly make our threat research findings available via our information resources and through our TI services. We encourage security analysts to also give a helping hand to others in the same collaborative way,” – comments Anatoly Simonenko, Group Manager, Technology Solutions Product Management, at Kaspersky. 

The full report is available via the link.

Author
AMEinfo Staff

AMEinfo staff members report business news and views from across the Middle East and North Africa region, and analyse global events impacting the region today.

© 2021, ADigitalcom. All rights reserved