Cloud Wars
  • Home
  • Top 10
  • CW Minute
  • CW Podcast
  • Categories
    • AI and Copilots
    • Innovation & Leadership
    • Cybersecurity
    • Data
  • Member Resources
    • Cloud Wars AI Agent
    • Digital Summits
    • Guidebooks
    • Reports
  • About Us
    • Our Story
    • Tech Analysts
    • Marketing Services
  • Summit NA
  • Dynamics Communities
  • Ask Copilot
Twitter Instagram
  • Summit NA
  • Dynamics Communities
  • AI Copilot Summit NA
  • Ask Cloud Wars
Twitter LinkedIn
Cloud Wars
  • Home
  • Top 10
  • CW Minute
  • CW Podcast
  • Categories
    • AI and CopilotsWelcome to the Acceleration Economy AI Index, a weekly segment where we cover the most important recent news in AI innovation, funding, and solutions in under 10 minutes. Our goal is to get you up to speed – the same speed AI innovation is taking place nowadays – and prepare you for that upcoming customer call, board meeting, or conversation with your colleague.
    • Innovation & Leadership
    • CybersecurityThe practice of defending computers, servers, mobile devices, electronic systems, networks, and data from malicious attacks.
    • Data
  • Member Resources
    • Cloud Wars AI Agent
    • Digital Summits
    • Guidebooks
    • Reports
  • About Us
    • Our Story
    • Tech Analysts
    • Marketing Services
    • Login / Register
Cloud Wars
    • Login / Register
Home » How Tactical Threat Intelligence Mitigates Business Risk by Targeting Malware
Cybersecurity

How Tactical Threat Intelligence Mitigates Business Risk by Targeting Malware

Chris HughesBy Chris HughesMay 3, 20234 Mins Read
Facebook Twitter LinkedIn Email
Share
Facebook Twitter LinkedIn Email
Acceleration Economy Cybersecurity

In a previous analysis, we discussed how sharing threat intelligence across the C-suite can foster cross-collaboration, empower other key C-suite executives to mitigate risk, and also contribute to a culture of security. This analysis will showcase a subset of threat intelligence, tactical threat intelligence. Tactical threat intelligence is the process of collecting and analyzing technical data to identify and mitigate cyber threats with a focus on malware and specific behavioral threat indicators for malicious actors.

Threat Intelligence Areas

There are three main threat intelligence areas, as depicted by cloud security company Crowdstrike in the image below: tactical, operational, and strategic.

While operational threat intelligence centers on improving cybersecurity operations and strategic threat intelligence is largely about better business decision-making activities, tactical threat intelligence focuses on performing specific activities using insights such as threat indicators to improve the performance of security tooling. It can be used to enhance the performance of things such as web application firewalls (WAFs), intrusion detection/prevention systems, and security operations center (SOC) analysts.

Tactical threat intelligence sources can include data from a variety of sources such as network logs, system event logs, and threat feeds. By analyzing this data, organizations can gain insights into the tactics, techniques, and procedures (TTPs) used by cybercriminals and better understand the potential impact of these threats on their business.

Crowdstrike chart outlining the three types of threat intelligence in cybersecurity.
Source: Crowdstrike

Benefits of Tactical Threat Intelligence

One of tactical threat intelligence’s primary benefits is that it can help organizations mitigate risk to their business by identifying and responding to threats in real time. I’ve had situations in my career where quick response made the difference between a minor incident or what could have been the exposure of several thousands of individuals’ personal data.

For example, if an organization detects unusual network traffic that could indicate a cyber attack, it can use technical threat intelligence to investigate the threat and take appropriate action to prevent further damage. This is where organizations are able to use the identified TTPs to determine if the behavior they are observing aligns with malicious actors’ behavior seen in the wild.

Another key benefit of tactical threat intelligence is that it can help organizations to prioritize cybersecurity efforts such as security architecture, engineering, and operations. It can be used to better architect environments, design secure systems and bolster security operations to mitigate malicious activity. By analyzing threat data and identifying the most significant threats, organizations can focus their resources on the areas of greatest risk.

Insights into Why & How to Recover from a Cybersecurity Breach
Guidebook: Cybersecurity Breach and Recovery Response

Leveraging Threat Intelligence

CISOs and other cybersecurity professionals can leverage tactical threat intelligence in a variety of ways to protect their organizations from cyber threats.

One common approach is to use threat intelligence platforms such as IBM X-Force or LookingGlass Cyber Solutions, which can help to automate the process of collecting and analyzing threat data. They can also help identify threats in real time and provide actionable insights that can be used to respond to threats quickly.

Another is to use threat intelligence feeds, which provide up-to-date information about known threats and their potential impact. These feeds can be integrated with security tools such as firewalls and intrusion detection systems to help organizations respond to threats more effectively.

In addition to these tools, organizations can also leverage threat intelligence to improve their incident response capabilities. By understanding the TTPs used by cybercriminals, organizations can develop incident response plans that are tailored to specific threats such as ransomware, malware, or data exfiltration. This can help to minimize the impact of cyber attacks and reduce the time it takes to detect and respond to them.

Finally, organizations can use technical threat intelligence to improve their overall cybersecurity posture. By analyzing threat data and identifying vulnerabilities, organizations can take proactive steps to mitigate these risks and reduce their overall exposure to cyber threats.

Which companies are the most important vendors in cybersecurity? Check out
the Acceleration Economy Cybersecurity
Top 10 Shortlist
.

Final Thoughts

In conclusion, tactical threat intelligence is a critical tool for organizations looking to mitigate risk to their business in today’s complex cyber threat landscape. By collecting and analyzing technical data, organizations can gain insights into the tactics, techniques, and procedures used by cybercriminals and take proactive steps to protect their business from these threats.

CISOs and other cybersecurity professionals can leverage a variety of tools and techniques to incorporate technical threat intelligence into their cybersecurity strategy and stay ahead of evolving threats. By doing so, they can help to ensure the security and resilience of their organization in the face of ever-changing cyber threats.


Want more cybersecurity insights? Visit the Cybersecurity channel:

Acceleration Economy Cybersecurity

automation CISO Cybersecurity data featured risk software
Share. Facebook Twitter LinkedIn Email
Analystuser

Chris Hughes

CEO and Co-Founder
Aquia

Areas of Expertise
  • Cloud
  • Cybersecurity
  • LinkedIn

Chris Hughes is a Cloud Wars Analyst focusing on the critical intersection of cloud technology and cybersecurity. As co-founder and CEO of Aquia, Chris draws on nearly 20 years of IT and cybersecurity experience across both public and private sectors, including service with the U.S. Air Force and leadership roles within FedRAMP. In addition to his work in the field, Chris is an adjunct professor in cybersecurity and actively contributes to industry groups like the Cloud Security Alliance. His expertise and certifications in cloud security for AWS and Azure help organizations navigate secure cloud migrations and transformations.

  Contact Chris Hughes ...

Related Posts

Workday Dismisses Agentic AI Arms Race, Focuses on Business Impact

May 16, 2025

Workday Lone Wolf: Focuses on 8 AI Agents vs. Competitors’ Hundreds

May 16, 2025

C-Suite Perspective: What the AI-Powered Org Looks Like, Today and in The Future

May 15, 2025

AI Maturity Declines Year Over Year, But Leaders Push Ahead on Innovation, AI Skills

May 15, 2025
Add A Comment

Comments are closed.

Recent Posts
  • Workday Dismisses Agentic AI Arms Race, Focuses on Business Impact
  • Workday Lone Wolf: Focuses on 8 AI Agents vs. Competitors’ Hundreds
  • C-Suite Perspective: What the AI-Powered Org Looks Like, Today and in The Future
  • AI Maturity Declines Year Over Year, But Leaders Push Ahead on Innovation, AI Skills
  • Microsoft’s Mission to Make Your Company AI First

  • Ask Cloud Wars AI Agent
  • Tech Guidebooks
  • Industry Reports
  • Newsletters

Join Today

Most Popular Guidebooks

Accelerating GenAI Impact: From POC to Production Success

November 1, 2024

ExFlow from SignUp Software: Streamlining Dynamics 365 Finance & Operations and Business Central with AP Automation

September 10, 2024

Delivering on the Promise of Multicloud | How to Realize Multicloud’s Full Potential While Addressing Challenges

July 19, 2024

Zero Trust Network Access | A CISO Guidebook

February 1, 2024

Advertisement
Cloud Wars
Twitter LinkedIn
  • Home
  • About Us
  • Privacy Policy
  • Get In Touch
  • Marketing Services
  • Do not sell my information
© 2025 Cloud Wars.

Type above and press Enter to search. Press Esc to cancel.

  • Login
Forgot Password?
Lost your password? Please enter your username or email address. You will receive a link to create a new password via email.