Talk With an Expert

CTI, CTI, CTI: Applying better terminology to threat intelligence objects

CTI, CTI, CTI: Applying better terminology to threat intelligence objects (PDF, 2.30MB)Published: 13 Jan, 2021
Created by:
Adam Greer

Increased awareness of the need for actionable cyber-threat intelligence (CTI) has created a boom in marketing that has flooded industry publications, news, blogs, and marketing material with the singular term applied to an increasingly diverse set of technologies and practices. In 2015, Dave Shackleford and Stephen Northcutt published findings of a survey sponsored by some of the largest names in cyber-threat intelligence at the time in order to address the widespread confusion around what precisely cyber-threat intelligence is and how it is generated, delivered, and consumed. In this research, they note that '... a shortage of standards and interoperability around feeds, context, and detection may become more problematic as more organizations add more sources of CTI...' (Shackleford, 2015). However, IT security teams have matured drastically since then, and most research has been applied to automation and standards for specific sub-domains, such as dissemination. This paper analyzes the current CTI environment and uses a defined methodology to develop a taxonomy for the domain that clarifies the application of CTI to security programs and serves as a foundation to further domain research.