The use of cyber threat intelligence (CTI) as a resource for network defense is growing, with 72% of respondents’ organizations producing or consuming CTI, compared with 60% in 2017. While the use of CTI continues to grow, there is no one-size-fits-all approach. Organizations leverage different types of CTI to meet different needs. This survey focuses on how and why CTI is being used, how it is helping defenders, what data sources are being leveraged, and how data is converted into usable intelligence.
Key takeaways from this year's survey:
CTI is used to determine where to focus security efforts, track adversary trends, detect adversary activity, and make networks more secure and resilient against threats.
NOTE: A valid email address is required to receive your requested asset.