Just like air travel, enterprise networks play host to millions of “passengers” each day, in the form of information packets. Companies enforce rules reduce the odds of being compromised. These measures work some of the time, but it is often hard to distinguish between risky traffic and good traffic, especially when risky traffic follows the rules. To address these shortcomings, enterprises require additional intelligence regarding the reputation, history, and context of the traffic on their networks.A cyber No-Fly List can use deeper context and existing intelligence about digital traffic. With an up-to-date threat list, enterprises can stay informed about the many factors that reveal the true nature of network traffic, including whether it’s associated with a known threat, who and what might be behind it, and whether it has been reported as a threat to others.Because all companies have unique characteristics and threat landscapes, there is no definitive or “master” cyber No-Fly List. Every company should develop its own threat list using the research that is most relevant to its industry, geography, business and other factors. Fortunately, there is an entire industry of cyber intelligence research providers can draw on, which includes proven feeds and analysis from organizations like CrowdStrike, FlashPoint, Digital Shadows, and Intel 471.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |