01.03.2019 Views

CDM-CYBER-DEFENSE-eMAGAZINE-March-2019

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Alongside more openly available sources of information, threat intelligence should also account<br />

for a third party’s hidden dark web footprint. By monitoring for the presence of corporate emails,<br />

credentials, and company mentions on dark web forums, it is possible to determine if a company<br />

is being actively targeted by criminal groups. The more frequently a firm is mentioned, the more<br />

likely it is to be the victim of an attack in the future. If stolen data is available on underground<br />

markets, the firm will present a greater risk of being exploited by attacks like credential stuffing,<br />

phishing and account impersonation, which will in turn present a threat to any connections.<br />

The elevated cyber risk presented by third parties is an inherent part of today’s interconnected,<br />

Digitally-driven business world. Organizations which are able to identify potential dangers in their<br />

suppliers and partners in real time will be much better equipped to mitigate any risks and<br />

confidently pursue the full benefits of their digitalization journey.<br />

About the Author<br />

Karen Levy, Senior Director of Product and Client Marketing<br />

at Recorded Future.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!