Threat Intel Odyssey: Mapping the Convergence of Social Cyber Risks
- Date:October 31, 2024
- Author(s):
- Tracy (Kitten) Goldberg
- Report Details: 7 pages, 2 graphics
- Research Topic(s):
- Cybersecurity
- Fraud & Security
- PAID CONTENT
Overview
Successful threat intelligence sharing–intel that cuts fraud losses and attributes indicators of compromise (IoCs) to responsible threat actors–will hinge on a few key factors and contributors. First, successful threat intel must rely on a breadth of data signals accessed and shared through a wide range of industry sectors. Second, intel has to be digestible, anonymous, and usable—meaning it must be translatable across platforms and technology. Javelin Strategy & Research believes cyber fusion models and/or those that fuse cyber fraud and anti-money-laundering intel will help industries accomplish successful sharing of threat intel, but cyber fusion is only one piece of the information-sharing puzzle. Without the right players at the table, information sharing that relies on meaningful threat intel will provide little more than it does today: views of accountholder data that are limited to specific types of financial accounts and fails to bring in the multitude of digital complexities and data that can make IoC signals around threat intel richer and more insightful.
This impact note reviews why the sharing of threat intel must expand beyond traditional financial services and governments to include the more traditionally casual and peripheral digital channels of social media, which are now the breeding ground for cybercrime and nation-state threats.
Book a Meeting with the Author
Related content
2025 Dark Web Threat Intelligence Vendor Scorecard
Javelin’s newest cybersecurity scorecard, the 2025 Dark Web Threat Intelligence Vendor Scorecard, evaluates leading dark web threat intelligence vendors on the market today. This i...
2026 Cybersecurity Trends
In the year ahead, financial services will face several trending challenges as they try to keep organizations and customers safe. Zero trust will come to the forefront of supply ch...
Social Signals, Malicious Motives: Emojis as a Cyber Weapon
Cybercriminals leverage emojis to evade defenses and use them in phishing and spoofing attacks to deceive victims and steal sensitive information. Emojis are also used to control c...
Make informed decisions in a digital financial world