• We’re Hiring
  • Request Demo
  • Support
  • Log In
  • Product keyboard_arrow_down
  • Solutions keyboard_arrow_down
  • Customers
  • Partners
  • Blog
  • Resources keyboard_arrow_down
  • Get started arrow_forward
  • Product
  • apps
    Overview
    Learn more about threat intelligence powered by machine learning
  • blur_on
    Technology
    See how collection from an unrivaled breadth of sources powers risk insights
  • developer_board
    Integrations
    Combine threat intelligence with your existing security technology
  • announcement
    Services
    Let our team of world-class analysts help you apply threat intelligence
  • device_hub
    API
    Connect to our real-time threat data through a flexible rest API
  • create
    Training
    Become an expert in threat intelligence through our educational programs
  • Solutions
    people By Role
  • Incident Response
  • Security Leadership
  • Security Operations
  • Threat Analysis
  • Vulnerability Management
  • extension By Need
  • Brand Monitoring
  • Dark Web Monitoring
  • Indicator Enrichment
  • Third-Party Risk
  • Threat Hunting
  • Threat Intelligence Platform
  • Threat Intelligence Feeds
  • business By Industry
  • Energy
  • Financial Services
  • Government
  • Healthcare
  • Retail
  • Resources
  • email
    Cyber Daily™
    Join over 35,000 subscribers who get daily threat insights by email
  • mic
    Podcasts
    Listen to our podcast to supercharge your threat intelligence knowledge
  • book
    The Book
    Download our new book to learn everything about threat intelligence
  • ondemand_video
    Webinars
    Watch live and on-demand webinars to hear from industry experts
  • how_to_reg
    Grader
    Take this short survey to assess your threat intelligence maturity
  • chrome_reader_mode
    White Papers
    Read our white papers to keep up with the latest threat intelligence advice
  • video_library
    Videos
    Watch our videos to see firsthand the power of threat intelligence
  • menu
    close
    • Product
      • Overview
      • Technology
      • Services
      • Integrations
      • API
      • Training
    • Solutions
      • Threat Analysis
      • Security Operations
      • Incident Response
      • Vulnerability Management
      • Security Leadership
      • Indicator Enrichment
      • Brand Monitoring
      • Threat Hunting
      • Cyber Risk Trends
      • Threat Intelligence Feeds
      • Financial Services
      • Healthcare
      • Retail
      • Energy
      • Government
    • Customers
    • Partners
    • Resources
      • Cyber Daily
      • Webinars
      • Podcasts
      • White Papers
    • Login
    How Web Intelligence Helps Cyber Security Professionals
    Recorded Future Blog

    How Web Intelligence Helps Cyber Security Professionals

    By Ken Buckler on January 4, 2014

    Editor’s Note

    The following interview is with Ken Buckler and is from our Web Intelligence Perspectives Series. Ken is a professional cyber security consultant.

    What is it about web intelligence that is such an important opportunity to you?

    Web intelligence provides the ability to be forewarned of new cyber threats in real-time. For the average person, cyber security just isn’t interesting – so cyber threats are severely under-reported in the mainstream media. Through web intelligence, cyber security professionals can stay up-to-date on emerging threats, and verify the proper defenses are in place before an incident occurs.

    What drives interest in web intelligence in your community? What hole in your world does it fill?

    Without web intelligence, unless you have a multinational spy network with a confidential informant in every hacking group around the world, your response to cyber threats will always be reactive instead of proactive. Web intelligence helps cyber security professionals adequately allocate limited resources to prepare for upcoming threats.

    What does a critical insight from web intelligence look like?

    Some critical insights can be extremely obvious, such as an announcement by a hacking group of a pending coordinated website defacement attack. However, sometimes the most critical insights are the least obvious without being taken in context, such as a random piece of code on a social networking site. Sometimes these seemingly random pieces of code just happen to reference a vulnerable file as part of an vulnerability which is currently unknown to the software vendor.

    Critical insights can often go unnoticed unless you’re specifically looking for mentions of that specific file. After all, the best place to hide something is in plain sight.

    What’s your vision of how web intelligence could be used?

    Web intelligence could be and should be used to obtain a 360 degree view of cyber threats, such as coordinated cyber attacks or new malware and exploits. Think of the internet as a huge distributed database of information. Like any database, you need to learn how to properly query for the information you’re looking for – the challenge is that unlike SQL, there is no set query language (yet), and not all of the data sources are easily accessible. In order to obtain a complete picture, web intelligence must evolve to provide easy access to the “dark” parts of the web, such as Tor, I2P, or peer-to-peer file sharing networks.

    Will web intelligence become a standard piece of tradecraft in your community? Will it “go viral”?

    I am a huge supporter of proactive security, and as such I believe web intelligence is absolutely essential to the cyber security community not just in the future, but right now.

    Every day new exploit code or malware is posted to the internet. By monitoring the web, early warning can be provided before a major malware outbreak occurs. However, if no one is looking for the new exploits or malware, then we are forced into reactive security – responding to incidents after they occur. Cyber threats are constantly evolving, and in order to effectively respond to new threats, the cyber security industry must continue to evolve as well.

    Ken Buckler

    Ken Buckler is a professional cyber security consultant. Over the years working for various contractors, he has provided services for clients such as Defense Information Systems Agency and the United States Department of Veterans Affairs. He maintains a threat intelligence platform called Caffeine Security, which includes a cyber security blog and cyber threat watch tools. You can also follow Ken on Twitter for up-to-date security news and information.

    Up next:
    Why Web Intelligence Promotes Collaboration

    Pat Ryan believes Web intelligence provides the opportunity to create collaboration among international military and law enforcement organizations.

    5 years AGO
    Pat Ryan
    Cyber Daily Banner
    listRecent Posts
    • The Challenges of Authentication at Scale and Quantifying Risk

      By Zane Pokorny

      on February 18, 2019

    • How to Build Comprehensive Security Processes With Threat Intelligence

      By Andrew Scott

      on February 15, 2019

    • Third-Party Risk: Keeping Your Friends Close and Your Enemies Not as Close

      By Zane Pokorny

      on February 14, 2019

    • 4 Ransomware Trends to Watch in 2019

      By Allan Liska

      on February 13, 2019

    • How Dragos Protects Industrial Control Systems With Threat Hunting

      By The Recorded Future Team

      on February 12, 2019

    Copyright © 2019 Recorded Future, INC.
    Product
  • Overview
  • Technology
  • Integrations
  • Services
  • API
  • Resources
  • Blog
  • Cyber Daily
  • Podcasts
  • Webinars
  • White Papers
  • Company
  • About
  • Events
  • Press
  • Contact
  • Jobs
  • Information
  • Support
  • FAQ
  • Terms
  • Privacy
  • Cookies
  • Copyright © 2019 Recorded Future, INC.
    closeclose