CyberIntel ⬡ News
★ Saved ◆ Cyber Reads
← Back ◉ Threat Intelligence

Broadcom’s Dick O’Brien: Sharing Threat Intelligence Key to Countering Cyberattackers - GovCon Wire

GovCon Wire Archived Mar 18, 2026 ✓ Full text saved

Broadcom’s Dick O’Brien: Sharing Threat Intelligence Key to Countering Cyberattackers GovCon Wire

Full text archived locally
✦ AI Summary · Claude Sonnet


    Dick O'Brien Home Cybersecurity Broadcom’s Dick O’Brien: Sharing Threat Intelligence Key to Countering Cyberattackers JANE EDWARDS September 4, 2025 CYBERSECURITY,NEWS Author: Jane Edwards || Date Published: September 4, 2025 Dick O’Brien, principal intelligence analyst for the Threat Hunter Team at Broadcom, said gaining insight into attackers and their tactics through threat intelligence could give cyber defenders the advantage to counter these threat actors. In an article published on Carahsoft.com, O’Brien wrote that some attackers leverage artificial intelligence to create malicious code and phishing materials. Amid the rapidly evolving threat landscape, he noted that Broadcom offers tools and support to help defenders fight cyberthreats. One of the offerings he mentioned is an analytical tool designed to identify patterns of malicious activity. He noted that the tool was trained on threat investigations the company conducted over a period of five or six years. “We use it ourselves and have also baked it into our products so customers can see the alerts and act on them,” he wrote. Broadcom’s Incident Prediction Tool Another technology O’Brien cited is an AI-powered tool called Incident Prediction. “When a breach is discovered on a network, Incident Prediction can identify the next steps the attackers will take, allowing responders to identify the areas of concern and close them off. They can take targeted action without being overly disruptive,” he noted. Hunting for Signs of Compromise Through Threat Intelligence In this piece, the Broadcom executive said the company helps customers look for signs of compromise across their networks and act on them by sharing a variety of threat intelligence. “We also produce threat alerts that share key indicators of compromise from recent attacks and offer a threat intelligence API that users can query for information about a specific file or network address, for example, to see how prevalent it is and whether we consider it malicious or benign,” O’Brien added. Sponsor
    💬 Team Notes
    Article Info
    Source
    GovCon Wire
    Category
    ◉ Threat Intelligence
    Published
    Archived
    Mar 18, 2026
    Full Text
    ✓ Saved locally
    Open Original ↗