{"id":7508,"date":"2022-11-10T15:56:13","date_gmt":"2022-11-10T15:56:13","guid":{"rendered":"https:\/\/www.jumpsec.com\/?p=7508"},"modified":"2024-04-26T10:11:28","modified_gmt":"2024-04-26T09:11:28","slug":"combining-artificial-intelligence-with-threat-intelligence","status":"publish","type":"post","link":"https:\/\/www.jumpsec.com\/guides\/combining-artificial-intelligence-with-threat-intelligence\/","title":{"rendered":"Combining Artificial Intelligence with Threat Intelligence"},"content":{"rendered":"[vc_row type=”in_container” full_screen_row_position=”middle” column_margin=”default” column_direction=”default” column_direction_tablet=”default” column_direction_phone=”default” scene_position=”center” text_color=”dark” text_align=”left” row_border_radius=”none” row_border_radius_applies=”bg” overflow=”visible” overlay_strength=”0.3″ gradient_direction=”left_to_right” shape_divider_position=”bottom” bg_image_animation=”none”][vc_column column_padding=”padding-2-percent” column_padding_tablet=”inherit” column_padding_phone=”inherit” column_padding_position=”left” column_element_direction_desktop=”default” column_element_spacing=”default” desktop_text_alignment=”default” tablet_text_alignment=”default” phone_text_alignment=”default” background_color_opacity=”1″ background_hover_color_opacity=”1″ column_backdrop_filter=”none” column_shadow=”none” column_border_radius=”none” column_link_target=”_self” column_position=”default” gradient_direction=”left_to_right” overlay_strength=”0.3″ width=”1\/1″ tablet_width_inherit=”default” animation_type=”default” bg_image_animation=”none” border_type=”advanced” border_left_desktop=”3px” column_border_color=”#dd0631″ column_border_style=”solid” column_padding_type=”default” gradient_type=”default”][vc_column_text]R&D is a fundamental part of what we do here at JUMPSEC. When we begin a research project, it\u2019s usually driven by a challenge or opportunity that we\u2019ve encountered. We hope this post helps you to gain insight to the creative process we apply when developing a solution or approach to solving a particular problem, and to what\u2019s coming up in future!<\/strong>[\/vc_column_text][\/vc_column][\/vc_row][vc_row type=”in_container” full_screen_row_position=”middle” column_margin=”default” column_direction=”default” column_direction_tablet=”default” column_direction_phone=”default” scene_position=”center” text_color=”dark” text_align=”left” row_border_radius=”none” row_border_radius_applies=”bg” overflow=”visible” overlay_strength=”0.3″ gradient_direction=”left_to_right” shape_divider_position=”bottom” bg_image_animation=”none”][vc_column column_padding=”no-extra-padding” column_padding_tablet=”inherit” column_padding_phone=”inherit” column_padding_position=”all” column_element_direction_desktop=”default” column_element_spacing=”default” desktop_text_alignment=”default” tablet_text_alignment=”default” phone_text_alignment=”default” background_color_opacity=”1″ background_hover_color_opacity=”1″ column_backdrop_filter=”none” column_shadow=”none” column_border_radius=”none” column_link_target=”_self” column_position=”default” gradient_direction=”left_to_right” overlay_strength=”0.3″ width=”1\/1″ tablet_width_inherit=”default” animation_type=”default” bg_image_animation=”none” border_type=”simple” column_border_width=”none” column_border_style=”solid”][vc_column_text]One of the primary challenges that our security analysts encounter is where and how to best use their time. Monitoring and reviewing the constant influx of data and alerts produced by our client\u2019s networks whilst also finding the time to keep on top of trending and emerging threats is no mean feat, and not particularly conducive to a healthy work-life balance\u2026<\/p>\n

Part of the problem is that finding the right information is an increasingly complex task. Cyber security is unique in comparison to many more established fields in that the best sources of information come at a grass-roots level, not through more typical academic channels or publications. This means that the most useful insights come from security companies and researchers. Unfortunately, this brings our analysts into contact with the sales and marketing materials that are everywhere on the internet today (we recognise the irony here). Few produce truly objective research content that can be applied without a specific paid tool or product. On the other hand, much of the technical research content produced is not always particularly current or innovative. While sometimes interesting, it is not always useful or actionable.<\/p>\n

We distilled the problem into two key areas:<\/p>\n