Should you’ve been in cybersecurity for the previous 5 to 10 years, you’ve most likely heard the time period “threat-informed protection.” Merely acknowledged, a threat-informed protection focuses security groups, applied sciences, and budgets on these threats almost definitely to influence a selected group, business, geography, and so forth.
The idea principally aligns with the well-known (and infrequently referenced) quote from Solar Tzu: “If you recognize the enemy and know your self, you needn’t worry the results of 100 battles. If you recognize your self however not the enemy, for each victory gained additionally, you will undergo a defeat. If you recognize neither the enemy nor your self, you’ll succumb in each battle.”
To place this in cybersecurity phrases, security groups want to watch the techniques, methods, and procedures (TTPs) of their adversaries, perceive how these TTPs may very well be prevented or detected by their security controls, after which make any changes essential to cowl gaps of their defenses.