CDM-CYBER-DEFENSE-eMAGAZINE-March-2019
Create successful ePaper yourself
Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.
Alongside more openly available sources of information, threat intelligence should also account<br />
for a third party’s hidden dark web footprint. By monitoring for the presence of corporate emails,<br />
credentials, and company mentions on dark web forums, it is possible to determine if a company<br />
is being actively targeted by criminal groups. The more frequently a firm is mentioned, the more<br />
likely it is to be the victim of an attack in the future. If stolen data is available on underground<br />
markets, the firm will present a greater risk of being exploited by attacks like credential stuffing,<br />
phishing and account impersonation, which will in turn present a threat to any connections.<br />
The elevated cyber risk presented by third parties is an inherent part of today’s interconnected,<br />
Digitally-driven business world. Organizations which are able to identify potential dangers in their<br />
suppliers and partners in real time will be much better equipped to mitigate any risks and<br />
confidently pursue the full benefits of their digitalization journey.<br />
About the Author<br />
Karen Levy, Senior Director of Product and Client Marketing<br />
at Recorded Future.