Close Menu
The CISO Brief
  • Home
  • Cyberattacks
    • Ransomware
    • Cybercrime
    • Data Breach
  • Emerging Tech
  • Threat Intelligence
    • Vulnerabilities
    • Cyber Risk
  • Expert Insights
  • Careers and Learning
  • Compliance

Subscribe to Updates

Subscribe to our newsletter and never miss our latest news

Subscribe my Newsletter for New Posts & tips Let's stay updated!

What's Hot

ASUS Armoury Crate Bug Exposes Windows to Admin Takeover

June 16, 2025

US Critical Infrastructure at Risk Amid Iran-Israel Tensions

June 16, 2025

8.4 Million Users’ Data Breached in Zoomcar Hack

June 16, 2025
Facebook X (Twitter) Instagram
The CISO Brief
  • Home
  • Cyberattacks
    • Ransomware
    • Cybercrime
    • Data Breach
  • Emerging Tech
  • Threat Intelligence
    • Vulnerabilities
    • Cyber Risk
  • Expert Insights
  • Careers and Learning
  • Compliance
The CISO Brief
Home » Trellix Finds Threat Intelligence Gap Calls
Solutions & Tech

Trellix Finds Threat Intelligence Gap Calls

Staff WriterBy Staff WriterJune 11, 2025No Comments4 Mins Read0 Views
Facebook Twitter Pinterest LinkedIn Tumblr Email
Share
Facebook Twitter LinkedIn Pinterest WhatsApp Email


Trellix, the company delivering the future of AI-powered cybersecurity, announced a new report, Mind of the CISO: Closing the gap between reaction and readiness, which found nearly all CISOs (98%) face barriers when acting on threat intelligence, with the top challenges reported as keeping pace with evolving threats (45%), integration issues (39%), and regulatory constraints (38%). As a result, threat intelligence defaults to a reactive function within a workstream, rather than an embedded, proactive strategy to build resilience, accelerate response, and stay ahead of evolving threats.

“Global threat detection volume from APT actors rose 45% at the beginning of this year, and CISOs are now tasked with staying ahead of these adversaries who are becoming more organized, well-resourced, and faster, partially due to the growing use of AI,” said John Fokker, Head of Threat Intelligence, Trellix. “Moving beyond a traditional tactical approach to utilizing operational threat intelligence allows CISOs to better understand the behaviors and objectives of threat actors, anticipate potential threats, and proactively prepare defense strategies.”

Cyber Technology Insights : F5 Secures Sensitive Data and Streamlines Compliance

The research reveals insights from over 500 CISOs worldwide on the evolving threat landscape and perceived risks to their organizations, and how the most forward-thinking leaders are embedding operational threat intelligence into their cybersecurity strategies. Key findings include:

The impact of nation-state threats: CISOs are increasingly focused on addressing nation-state threats, with a majority (89%) frequently asked about these threats by their CEO and/or the board, further impacting their cybersecurity strategy and budget. The majority report their organization’s cybersecurity budget (85%) and cybersecurity strategy (87%) are influenced by the volume of nation-state threats.

Moving beyond reactive, tactical threat intelligence to proactive, operational threat intelligence: Nearly all CISOs agree threat intelligence is essential for identifying and mitigating emerging cybersecurity threats (94%). Still, the majority report their organizations’ approaches to collecting (82%), analyzing (78%), incorporating (79%), and monitoring (80%) threat intelligence require significant improvements or a complete overhaul. Organizations with a proactive approach to threat intelligence (44%) are considerably more likely to use advanced threat detection technologies over the next 12 months, highlighting how a forward-leaning approach impacts technology decisions and, in turn, resilience. This further underscores the need to move beyond a reactive approach (56%) with siloed applications of threat intelligence.

The role of AI and automation in combating threats: One-third of CISOs agree AI-driven analytics (33%) and increased levels of automation (37%) would help them perform their responsibilities more effectively, with 28% reporting limited automation makes it difficult to integrate tools into their threat intelligence programs. This highlights the importance of AI and automation investments in optimizing cyber response strategies.

Cyber Technology Insights : Blackpoint Cyber and UKON Partner to Redefine Cyber Risk Protection

The value of peer communities: The majority of CISOs (95%) agree being part of a threat intelligence sharing community or network improves their ability to prepare for threats, and agree a CISO community (89%) would enable security leaders to navigate high-stakes decisions through trusted insights and shared experiences. The complexity of the CISO role and increasing responsibilities make information sharing and collaboration among peers critical for success.

Operational threat intelligence in practice

Organizations leverage operational intelligence to understand the broader context of cyber attacks, like threat actor motivations and methods being used. This enables security teams to anticipate and prepare for specific types of attacks, which is why adopting threat intelligence as a strategic capability is paramount. With over half (60%) of organizations yet to fully integrate threat intelligence into their wider cybersecurity strategy, the time for action is now if organizations are to keep pace with nefarious actors and limit risk.

Commitment is needed across the industry to close the threat intelligence gap. CISOs must move beyond reactive threat intelligence to strategically position it within their cybersecurity playbooks, and to do so, they’ve asked for more integrated systems, innovative tooling, and stronger community collaboration. Organizations must support their CISOs and prioritize these investments to maintain resilience and reduce risk. Policymakers should look to modernize intelligence sharing frameworks, deepen public-private sector collaboration, and accelerate AI adoption in national cyber infrastructures.

Cyber Technology Insights : NordVPN Validated in Independent Security and Performance Evaluation

To participate in our interviews, please write to our CyberTech Media Room at sudipto@intentamplify.com

Source: businesswire



Source link

Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
Previous Article100-1000x more accurate Java vulnerability detection
Next Article Ontinue First to Launch Agentic AI-Powered Incident Investigations
Avatar photo
Staff Writer
  • Website

John Marcelli is a staff writer for the CISO Brief, with a passion for exploring and writing about the ever-evolving world of technology. From emerging trends to in-depth reviews of the latest gadgets, John stays at the forefront of innovation, delivering engaging content that informs and inspires readers. When he's not writing, he enjoys experimenting with new tech tools and diving into the digital landscape.

Related Posts

Adeel Shaikh Releases Updated Book on AI-Driven SOC Shif

June 14, 2025

Glider AI Launches ID Verify to Tackle Hiring Fraud Risks

June 14, 2025

SutiSign Boosts eSignature Security with Smart ID Verificatio

June 14, 2025
Leave A Reply Cancel Reply

Latest Posts

ASUS Armoury Crate Bug Exposes Windows to Admin Takeover

June 16, 20250 Views

8.4 Million Users’ Data Breached in Zoomcar Hack

June 16, 20250 Views

Hack Attack: Journalists’ Accounts Compromised

June 16, 20250 Views

Anubis Ransomware: Total File Encyption and Wipe Threatens Recovery

June 16, 20250 Views
Don't Miss

Big Risks for Malicious Code, Vulns

By Staff WriterFebruary 14, 2025

Attackers are finding more and more ways to post malicious projects to Hugging Face and…

North Korea’s Kimsuky Attacks Rivals’ Trusted Platforms

February 19, 2025

Deepwatch Acquires Dassana to Boost Cyber Resilience With AI

February 18, 2025

Subscribe to Updates

Subscribe to our newsletter and never miss our latest news

Subscribe my Newsletter for New Posts & tips Let's stay updated!

About Us
About Us

Welcome to The CISO Brief, your trusted source for the latest news, expert insights, and developments in the cybersecurity world.

In today’s rapidly evolving digital landscape, staying informed about cyber threats, innovations, and industry trends is critical for professionals and organizations alike. At The CISO Brief, we are committed to providing timely, accurate, and insightful content that helps security leaders navigate the complexities of cybersecurity.

Facebook X (Twitter) Pinterest YouTube WhatsApp
Our Picks

ASUS Armoury Crate Bug Exposes Windows to Admin Takeover

June 16, 2025

US Critical Infrastructure at Risk Amid Iran-Israel Tensions

June 16, 2025

8.4 Million Users’ Data Breached in Zoomcar Hack

June 16, 2025
Most Popular

Attackers lodge backdoors into Ivanti Connect Secure devices

February 15, 20255 Views

VanHelsing Ransomware Builder Leaked: New Threat Emerges!

May 20, 20254 Views

SonicWall SMA 1000 series appliances left exposed on the internet

February 14, 20254 Views
© 2025 thecisobrief. Designed by thecisobrief.
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions

Type above and press Enter to search. Press Esc to cancel.