{"id":7580,"date":"2014-12-08T06:00:32","date_gmt":"2014-12-08T14:00:32","guid":{"rendered":"https:\/\/www.paloaltonetworks.com\/blog\/?p=7580"},"modified":"2015-10-07T15:20:43","modified_gmt":"2015-10-07T22:20:43","slug":"2015-predictions-tailored-threat-intelligence","status":"publish","type":"post","link":"https:\/\/www2.paloaltonetworks.com\/blog\/2014\/12\/2015-predictions-tailored-threat-intelligence\/","title":{"rendered":"2015 Predictions: Tailored Threat Intelligence"},"content":{"rendered":"<p><em>As 2014 comes to a close, our subject matter experts check in on what they see as major topics and trends for the new year. (You can read all of our 2015 predictions content\u00a0<\/em><a href=\"https:\/\/www.paloaltonetworks.com\/blog\/tag\/2015-predictions\/\" target=\"_blank\"><em>here<\/em><\/a><em>.)<\/em><\/p>\n<p><div style=\"max-width:100%\" data-width=\"500\"><span class=\"ar-custom\" style=\"padding-bottom:59%;\"><img loading=\"lazy\" decoding=\"async\"  class=\"aligncenter size-large wp-image-7442 lozad\"  data-src=\"https:\/\/www.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/11\/2015-Predictions-Image-01-500x295.jpg\" alt=\"2015 Predictions Image-01\" width=\"500\" height=\"295\" srcset=\"https:\/\/www2.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/11\/2015-Predictions-Image-01-500x295.jpg 500w, https:\/\/www2.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/11\/2015-Predictions-Image-01-230x135.jpg 230w, https:\/\/www2.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/11\/2015-Predictions-Image-01-510x300.jpg 510w, https:\/\/www2.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/11\/2015-Predictions-Image-01-67x40.jpg 67w\" sizes=\"auto, (max-width: 500px) 100vw, 500px\" \/><\/span><\/div><\/p>\n<p>Reading the collective tealeaves for adversaries 12 months from now is almost always a losing proposition. You are essentially trying to predict the tools, tactics and techniques that are going to be employed by incredibly skilled and intelligent attackers. Yes, we know more data breaches will occur, more records will be stolen, new technologies will be exploited, and more malware will be created than has ever been seen before. These are all givens in today\u2019s threat landscape\u2014the bad guys are out there, getting more efficient at their jobs, and constantly evolving.<\/p>\n<p>The question becomes, what can we do about this in 2015? Here\u2019s how I see it:<!--more--><\/p>\n<p><strong>1. The year big data security analytics goes mainstream<\/strong>.<\/p>\n<p>For advanced threats, the problem has always been attempting to find the small indicators that could reveal an attack. Many have tried to bring together enough intelligence, horsepower and analysis to find these \u201cneedles in a haystack,\u201d but it hasn\u2019t been enough. While there have been hints of success, applying big data analytics techniques to security will come into its own in 2015. We have hit the inflection point where computing power, availability of data, analytic models and most importantly the willingness and drive to see them through are here. We will see massive advances this coming year in our ability to collect, analyses, search, correlate, visualize and turn data into actionable security intelligence.<\/p>\n<p><strong>2. Tailored threat intelligence. <\/strong><\/p>\n<p>Increasingly, sophisticated organizations are realizing that certain types of attacks, or certain groups of attackers come after them. For example, there are certain steps an adversary will take to compromise a retail companies\u2019 Point of Sale (POS) systems versus an entertainment organization\u2019s databases, or the customer records at a major hospital. The motivations are different, the exploits and malware unique, and the methods change in each case. 2015 will be a banner year for profiling how attacks differ by industry, which vectors are higher risk for individual organizations, and tailoring custom protections in each case.<\/p>\n<p><strong>3. Sharing security intelligence.<\/strong><\/p>\n<p>Many major enterprises have learned the critical importance of sharing intelligence about the current state of the threat landscape \u2013 such as those in organizations like the FS-ISAC. Everyone benefits from information shared by one member, and collective immunity can be developed, stopping advanced attacks before they can compromise multiple organizations. This coming year will represent widespread adoption and acceptance of information sharing. The days of \u201cholding it close\u201d are over \u2013 the volume and sophistication of attacks requires a joint response.<\/p>\n<p>A common theme runs through my thoughts on 2015: making better use of the data we have. Whether it is better algorithms to predict the next attack, understanding your risk posture, or sharing what you know with others \u2013 intelligence is key. Turning the massive churn of data enterprise organizations see each day into actionable intelligence, automatically, will be a major theme for 2015.<\/p>\n<p>&nbsp;<\/p>\n<p><em>Threat intelligence is\u00a0among many industry-specific topics planned for\u00a0<a href=\"https:\/\/www.paloaltonetworks.com\/content\/campaigns\/ignite\/2015\/index.html\">Ignite 2015<\/a>, where you will tackle your toughest security challenges, get your hands dirty in one of our workshops, and expand your threat IQ.\u00a0<a href=\"https:\/\/ignite2015.paloaltonetworks.com\/portal\/createAccount.ww\">Register now<\/a>\u00a0to join us March 30-April 1, 2015 in Las Vegas \u2014 the best security conference you\u2019ll attend all year.<\/em><\/p>\n<p><div style=\"max-width:100%\" data-width=\"500\"><span class=\"ar-custom\" style=\"padding-bottom:27.6%;\"><img loading=\"lazy\" decoding=\"async\"  class=\"aligncenter wp-image-7354 lozad\"  data-src=\"https:\/\/www.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/11\/PAN_IC15_web_logo-1.jpg\" alt=\"PAN_IC15_web_logo-1\" width=\"500\" height=\"138\" srcset=\"https:\/\/www2.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/11\/PAN_IC15_web_logo-1.jpg 400w, https:\/\/www2.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/11\/PAN_IC15_web_logo-1-230x63.jpg 230w, https:\/\/www2.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/11\/PAN_IC15_web_logo-1-145x40.jpg 145w\" sizes=\"auto, (max-width: 500px) 100vw, 500px\" \/><\/span><\/div><\/p>\n","protected":false},"excerpt":{"rendered":"<p>As 2014 comes to a close, our subject matter experts check in on what they see as major topics and trends for the new year. (You can read all of our 2015 &hellip;<\/p>\n","protected":false},"author":41,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[229,108],"tags":[925,959,922],"coauthors":[776],"class_list":["post-7580","post","type-post","status-publish","format-standard","hentry","category-predictions","category-threat-prevention-2","tag-2015-predictions","tag-big-data","tag-threat-intelligence"],"jetpack_featured_media_url":"","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/7580","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/users\/41"}],"replies":[{"embeddable":true,"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/comments?post=7580"}],"version-history":[{"count":4,"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/7580\/revisions"}],"predecessor-version":[{"id":7588,"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/7580\/revisions\/7588"}],"wp:attachment":[{"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/media?parent=7580"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/categories?post=7580"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/tags?post=7580"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/coauthors?post=7580"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}