CyberIntel ⬡ News
★ Saved ◆ Cyber Reads
← Back ◉ Threat Intelligence

What Makes Great Threat Intelligence? - Dark Reading

Dark Reading Archived Mar 17, 2026 ✓ Full text saved

What Makes Great Threat Intelligence? Dark Reading

Full text archived locally
✦ AI Summary · Claude Sonnet


    THREAT INTELLIGENCE CYBER RISK CYBERSECURITY OPERATIONS WHAT IS Cybersecurity In-Depth: Feature articles on security strategy, latest trends, and people to know. What Makes Great Threat Intelligence? Anyone can buy or collect data, but the goal must be to realize actionable insight relevant to the organization in question. Richard Thurston,Contributing Writer, Dark Reading July 23, 2025 6 Min Read SOURCE: SLEEPYFELLOW VIA ALAMY STOCK PHOTO Fast-changing geopolitics are constantly altering the nature of threats, so CISOs must quickly adapt how they approach new risks and sources of intelligence. While the need for high-quality threat intelligence is undeniable, it is a discipline that can sprawl uncontrollably. It also requires a targeted response. According to industry analysts at Frost & Sullivan, organizations spent a weighty $1.6 billion on threat intelligence and threat intelligence platforms globally in 2023. They expect this figure to increase by a compound annual growth rate of 32.8% until 2028. CISOs' threat intelligence programs must be continuous and defined. Anyone can buy or collect data across the four threat intelligence domains (strategic, tactical, operational, and technical), but realizing actionable insight that is relevant to the organization in question must be the goal. "I'm struck by how much of the [threat intelligence on the market right now doesn't really offer true threat intelligence but rather automated analysis of security data," says Victoria Baines, professor of IT at Gresham College in London. Related:Inside Olympic Cybersecurity: Lessons From Paris 2024 to Milan Cortina 2026 Continuity, Insight, and Collaboration Whether threat intelligence is insourced or outsourced, security teams must focus on getting the outcomes they need from their threat intelligence, rather than simply the delivery of data. CISOs should ensure their threat intelligence program has defined goals that align with the rest of their cybersecurity strategies and business objectives. The program must address compliance requirements, yet extend beyond. A feedback loop that facilitates ongoing improvements is also essential. "The three questions are: How do I measure the value or ROI? How do I get what is relevant to me? How do I translate that threat into risk?" says Matt Hull, global head of threat intelligence for NCC Group. Where the second and third questions overlap is the point where CISOs will understand the specific threats to their businesses, he adds. Relevance is critical: An operator of critical national infrastructure has very different threat intelligence needs than a retailer or pharmaceuticals manufacturer. "Do some requirements-gathering up front: What are the threats to your sector?" says Ben Radcliff, vice president of security operations for Optiv. "Tailor your requirements to those, pulling in specific threat feeds." This combination of internal and external data is invaluable. Data should include vulnerability information and indicators of compromise, as well as data on threat actors and their tactics, techniques, and procedures (TTPs). Threat intelligence specialists are adept at finding relevant information from the Deep Web and Dark Web, as well as public domain sources like social media and Internet forums. In addition, individual sectors — notably financial services — have their own sector-specific information-sharing groups (ISACs), while national and regional governmental organizations share specific intelligence with groups of businesses that are within their remit to protect. Related:Cybersecurity Predictions for 2026: Navigating the Future of Digital Threats Geopolitics: Critically Influential Geopolitics are shaping both the threat landscape and CISOs' responses to these changes. Some organizations will be targeted directly because of political events, while others can be caught in the crossfire. Additionally, physical risks may not be a CISO's responsibility but will affect the organization's security posture, so they should be aware. It is smart to understand how global events can impact an organization, especially if it has global operations, says Sherrod DeGrippo, director of threat intelligence strategy at Microsoft. The Russia-Ukraine War is an obvious example that changed threat actors' TTPs and targets, but geopolitics are so complicated that smaller events can still cause significant changes to specific organizations' risk profiles and therefore their optimal responses.  Related:Why a 17-Year-Old Built an AI Model to Expose Deepfake Maps This geopolitical turbulence will "profoundly affect" the cybersecurity industry, changing spending patterns on threat intelligence, according to Martin Naydenov, a cybersecurity analyst at Frost & Sullivan, noting that conflicts such as the war in Ukraine and economic sanctions feed an escalating cycle of tensions and state-sponsored espionage. "This chaos has a dual impact on the threat intelligence industry: Organizations face relentless threats, driving demand for TI solutions, while imposed sanctions and mistrust constrain the industry," he recently explained. Think Two Steps Ahead Although automation is critical in cutting through large volumes of threat intelligence to realize actionable data, human factors remain crucial. Security teams should grow their knowledge of their own organizations and the ability to think faster than threat actors, DeGrippo says. "Have people on your team who are true specialists — not just in threat intelligence but in your business," she says. "When a well-equipped threat actor is targeting a particular enterprise, they know just as much about it, sometimes more than the employees." The ability to think ahead is probably the most important aspect of threat intelligence, followed by "the discipline and rigor to wait — where appropriate — to ensure accuracy and to work out what other intelligence you need," DeGrippo says. CISOs need to evolve their skillsets and knowledge of criminal market dynamics and behavior, Gresham College's Baines adds. But, mostly, they need to develop a more proactive mindset to anticipate and prevent attacks, "rather than constantly firefighting," she says. Overcoming Resource Limitations Organizations are limited from fully leveraging their threat intelligence deployments and monitoring the threat landscape due to a shortage of security professionals, Naydenov warned. Companies struggle with the amount of information TI solutions generate, leaving gaps in threat detection and response, which slows their ability to keep up with emerging threats, he explained.  CISOs with limited internal resources can opt to use vendors' threat intelligence platforms for richer data and vendor services to increase their headcounts and broaden the available skillsets. There is a growing and, at times, bewildering choice of platforms and services, with substantial differences in methodologies. The addition of threat hunters, provided by a number of specialist services companies, can help mitigate risk by providing a very personal and tailored skillset to proactively identify threats.  Avoid Intelligence Pitfalls The Information Security Forum (ISF), an organization that guides CISOs on information security and risk management matters, warns of the danger of irrelevant information and misinformation creeping into threat intelligence feeds. It recommends reducing the reliance on open source intelligence gathered from social media and focusing on threat intelligence from "a smaller number of trusted sources." The ISF suggests that CISOs consider weighting threat intelligence sources based on the level of trust of the source and monitor sources (especially free ones) for changes in behavior. If the CISO believes a source has started to share misinformation, it should be removed. Ask the Right Questions "There is sometimes a tendency to be hyperbolic" about threat models and attack surfaces, DeGrippo adds. CISOs need to get real about what is truly exposed and what they need to know, especially looking for the data they don't have on hand. Find out which threat actors are active in the industry and region, what TTPs they use, and how the organization is prepared for them, she recommends.  "You have to really understand what your particular true threat profile is like. Once you have that information, start drilling down," DeGrippo says. There is no need to separate criminals from nation-state actors in this exercise, she notes: "Security is security." About the Author Richard Thurston Contributing Writer, Dark Reading Richard Thurston is a contributing writer for Dark Reading. More Insights Industry Reports Frost Radar™: Non-human Identity Solutions 2026 CISO AI Risk Report The ROI of AI in Security Cybersecurity Forecast 2026 ThreatLabz 2025 Ransomware Report Access More Research Webinars Building a Robust SOC in a Post-AI World Retail Security: Protecting Customer Data and Payment Systems Rethinking SSE: When Unified SASE Delivers the Flexibility Enterprises Need Securing Remote and Hybrid Work Forecast: Beyond the VPN AI-Powered Threat Detection: Beyond Traditional Security Models More Webinars You May Also Like THREAT INTELLIGENCE React2Shell Exploits Flood the Internet as Attacks Continue by Rob Wright DEC 12, 2025 THREAT INTELLIGENCE Iran Exploits Cyber Domain to Aid Kinetic Strikes by Robert Lemos, Contributing Writer NOV 26, 2025 THREAT INTELLIGENCE Human Digital Twins Could Give Attackers a Dangerous Advantage by Arielle Waldman JUL 21, 2025 CYBERATTACKS & DATA BREACHES DeepSeek Breach Opens Floodgates to Dark Web by Emma Zaballos APR 22, 2025 Edge Picks APPLICATION SECURITY AI Agents in Browsers Light on Cybersecurity, Bypass Controls CYBER RISK Browser Extensions Pose Heightened, but Manageable, Security Risks CYBERSECURITY OPERATIONS Video Convos: Agentic AI, Apple, EV Chargers; Cybersecurity Peril Abounds ENDPOINT SECURITY Extension Poisoning Campaign Highlights Gaps in Browser Security Latest Articles in The Edge THREAT INTELLIGENCE Inside Olympic Cybersecurity: Lessons From Paris 2024 to Milan Cortina 2026 MAR 16, 2026 THREAT INTELLIGENCE The Data Gap: Why Nonprofit Cyber Incidents Go Underreported MAR 13, 2026 CYBER RISK Cyberattackers Don't Care About Good Causes MAR 13, 2026 CYBER RISK What Orgs Can Learn From Olympics, World Cup IR Plans MAR 12, 2026 Read More The Edge Want more Dark Reading stories in your Google search results?
    💬 Team Notes
    Article Info
    Source
    Dark Reading
    Category
    ◉ Threat Intelligence
    Published
    Archived
    Mar 17, 2026
    Full Text
    ✓ Saved locally
    Open Original ↗