<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Cyber Threat Intelligence Archives - L2 Cyber Security Solutions Ltd.</title>
	<atom:link href="https://www.l2cybersecurity.com/tag/cyber-threat-intelligence/feed/" rel="self" type="application/rss+xml" />
	<link>https://www.l2cybersecurity.com/tag/cyber-threat-intelligence/</link>
	<description>#SecuritySimplified</description>
	<lastBuildDate>Thu, 09 Jul 2020 21:57:54 +0000</lastBuildDate>
	<language>en-GB</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	

<image>
	<url>https://www.l2cybersecurity.com/wp-content/uploads/2023/03/cropped-Logo-Only-Favicon-Transparent-32x32.png</url>
	<title>Cyber Threat Intelligence Archives - L2 Cyber Security Solutions Ltd.</title>
	<link>https://www.l2cybersecurity.com/tag/cyber-threat-intelligence/</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>#WeekendWisdom 036 Cyber Threat Intelligence</title>
		<link>https://www.l2cybersecurity.com/weekendwisdom-036-cyber-threat-intelligence/</link>
		
		<dc:creator><![CDATA[Liam]]></dc:creator>
		<pubDate>Thu, 09 Jul 2020 23:05:20 +0000</pubDate>
				<category><![CDATA[News]]></category>
		<category><![CDATA[#SecuritySimplified]]></category>
		<category><![CDATA[#WeekendWisdom]]></category>
		<category><![CDATA[Clare]]></category>
		<category><![CDATA[Cyber Security]]></category>
		<category><![CDATA[Cyber Threat]]></category>
		<category><![CDATA[Cyber Threat Intelligence]]></category>
		<category><![CDATA[Limerick]]></category>
		<category><![CDATA[Threat Intelligence]]></category>
		<category><![CDATA[Tipperary]]></category>
		<guid isPermaLink="false">https://www.l2cybersecurity.com/?p=2184</guid>

					<description><![CDATA[<p>Welcome to #WeekendWisdom number 36. This week we&#8217;re going to talk about Cyber Threat Intelligence. Where did this one come from? Last week, a very significant vulnerability was revealed in F5 Big-IP networking equipment. It&#8217;s so significant that it was trivial for attackers to be able to compromise these devices from the internet. I was&#8230;</p>
<p>The post <a href="https://www.l2cybersecurity.com/weekendwisdom-036-cyber-threat-intelligence/">#WeekendWisdom 036 Cyber Threat Intelligence</a> appeared first on <a href="https://www.l2cybersecurity.com">L2 Cyber Security Solutions Ltd.</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>Welcome to #WeekendWisdom number 36. This week we&#8217;re going to talk about Cyber Threat Intelligence.<span id="more-2184"></span></p>
<div style="width: 1280px;" class="wp-video"><video class="wp-video-shortcode" id="video-2184-1" width="1280" height="720" preload="metadata" controls="controls"><source type="video/mp4" src="https://www.l2cybersecurity.com/wp-content/uploads/2020/07/WeekendWisdom-036-lo.mp4?_=1" /><a href="https://www.l2cybersecurity.com/wp-content/uploads/2020/07/WeekendWisdom-036-lo.mp4">https://www.l2cybersecurity.com/wp-content/uploads/2020/07/WeekendWisdom-036-lo.mp4</a></video></div>
<h3>Where did this one come from?</h3>
<p>Last week, a very significant vulnerability was revealed in <a href="https://www.tenable.com/blog/cve-2020-5902-critical-vulnerability-in-f5-big-ip-traffic-management-user-interface-tmui" target="_blank" rel="noopener noreferrer">F5 Big-IP networking equipment</a>. It&#8217;s so significant that it was trivial for attackers to be able to compromise these devices from the internet.</p>
<p>I was speaking with friend of mine, whose company I knew used F5 equipment. He had been surprised to hear about it. He hadn&#8217;t heard about it through his normal channels.</p>
<p>This got me thinking about where did he get his cyber threat intelligence from? And it was a weekly newsletter that he had signed up to.</p>
<h3>What is Cyber Threat Intelligence?</h3>
<p>Now threat intelligent basically is information that is published from public sources. They tell about vulnerabilities and things that are going on. Attacks that are being perpetrated by different nation states and organised gangs, etc.</p>
<h3>Where can you get this from?</h3>
<p>So I get daily feeds from the likes of the <a href="https://isc.sans.edu/" target="_blank" rel="noopener noreferrer">Internet Storm Center</a>. They publish details on the fly of anything they become aware of. You can sign up to receive these in an email. There is also their daily podcast which is called the <a href="https://isc.sans.edu/podcast.html" target="_blank" rel="noopener noreferrer">StormCast</a>. This is a great 5 to 6 minutes long Podcast.</p>
<p>The Cyber Wire also put out a <a href="https://thecyberwire.com/podcasts/daily-podcast" target="_blank" rel="noopener noreferrer">daily podcast</a> that takes perhaps 15 to 20 minutes and it gets into a bit more detail.</p>
<p>The <a href="https://www.ncsc.gov.ie/" target="_blank" rel="noopener noreferrer">National Cyber Security Centre</a> in Ireland also put out a weekly newsletter. This contains summaries of all the week&#8217;s news. So these are really great sources of getting your cyber threat intelligence. So you should sign up to.</p>
<p>There are many, many different sources for Cyber Threat Intelligence. Find the one that suits you best and use that.</p>
<h3>Can any of this stuff be automated?</h3>
<p>Yes. You can get feeds that provide the intelligence which the likes of:</p>
<ul>
<li>Security Information and Event Management (SIEM) systems</li>
<li>Intrusion Detection Systems (IDS)</li>
<li>Intrusion Prevention Systems (IPS)</li>
</ul>
<p>can utilise to protect your infrastructure. These are outside of the scope for this blog post.</p>
<p>So that’s it for this week. Let’s be careful out there and we’ll talk to you again next week.</p>
<hr />
<h2>How can L2 Cyber Security help you?</h2>
<p>We offer a full range of <a href="https://www.l2cybersecurity.com/training" target="_blank" rel="noopener noreferrer">training programmes</a>, which can be delivered online or in-person<strong>*</strong>.</p>
<p>L2 Cyber Security are also a partner of <a href="https://www.cyberriskaware.com/" target="_blank" rel="noopener noreferrer">CyberRiskAware</a> for online self-directed Cyber Security Awareness training and Phishing testing.</p>
<p>Contact us for more information at <a href="mailto:info@L2CyberSecurity.com" target="_blank" rel="noopener noreferrer">info@L2CyberSecurity.com</a>.</p>
<p><strong>*</strong>With appropriate social distancing and other health and safety measures adhered to.</p>
<hr />
<h2>Follow us on Social media:</h2>
<p>Liam is available on <a href="https://twitter.com/L2_Evangelist" target="_blank" rel="noopener noreferrer">Twitter</a>, <a href="https://www.linkedin.com/in/lynchliam/" target="_blank" rel="noopener noreferrer">LinkedIn</a> and <a href="https://www.instagram.com/l2_evangelist/" target="_blank" rel="noopener noreferrer">Instagram</a>.</p>
<p>Follow L2 Cyber on <a href="https://twitter.com/L2Cyber" target="_blank" rel="noopener noreferrer">Twitter</a>, <a href="https://www.linkedin.com/company/l2cyber/" target="_blank" rel="noopener noreferrer">LinkedIn</a>, <a href="https://www.instagram.com/l2cyber/" target="_blank" rel="noopener noreferrer">Instagram</a> and <a href="https://www.facebook.com/L2Cyber/" target="_blank" rel="noopener noreferrer">Facebook</a>.</p>
<p><a href="https://www.l2cybersecurity.com/" target="_blank" rel="noopener noreferrer">© L2 Cyber Security Solutions</a></p>
<p>The post <a href="https://www.l2cybersecurity.com/weekendwisdom-036-cyber-threat-intelligence/">#WeekendWisdom 036 Cyber Threat Intelligence</a> appeared first on <a href="https://www.l2cybersecurity.com">L2 Cyber Security Solutions Ltd.</a>.</p>
]]></content:encoded>
					
		
		<enclosure url="https://www.l2cybersecurity.com/wp-content/uploads/2020/07/WeekendWisdom-036-lo.mp4" length="23681212" type="video/mp4" />

			</item>
	</channel>
</rss>
