{"id":356295,"date":"2025-07-11T00:32:25","date_gmt":"2025-07-10T19:02:25","guid":{"rendered":"https:\/\/www.technologyforyou.org\/?p=356295"},"modified":"2025-07-11T00:32:25","modified_gmt":"2025-07-10T19:02:25","slug":"new-research-highlights-low-operational-maturity-limited-sharing-practices-and-growing-demand-for-ai-powered-support","status":"publish","type":"post","link":"https:\/\/www.technologyforyou.org\/new-research-highlights-low-operational-maturity-limited-sharing-practices-and-growing-demand-for-ai-powered-support\/","title":{"rendered":"New Research Highlights Low Operational Maturity, Limited Sharing Practices and Growing Demand for AI-powered Support"},"content":{"rendered":"<div class=\"press-release ui-kit-press-release-content overflow-hidden\">\n<p class=\"bwalignc\"><span style=\"font-family: georgia, palatino, serif; font-size: 12pt;\"><b>Cyware Survey at InfoSec Europe Reveals Industry Gap in Operationalising Threat Intelligence<\/b><\/span><\/p>\n<\/div>\n<div class=\"bw-release-body ui-kit-press-release-body ui-kit-press-release__body\">\n<div id=\"bw-release-story\" class=\"press-release ui-kit-press-release-content overflow-hidden bw-release-story ui-kit-press-release-body__story mt-6 lg:mt-10 font-oxygen text-base font-normal leading-[1.5em] lg:text-xl lg:leading-[1.6em]\">\n<div>\n<p><span style=\"font-family: georgia, palatino, serif; font-size: 12pt;\">LONDON&#8211;(BUSINESS WIRE)&#8211;Cyware, the leader in threat intelligence management, security collaboration, and orchestrated response, today released new research revealing that a majority see the importance of having a Threat Intelligence Program and have started a Program. However, 80% of respondents recognise their threat intelligence programs are not fully operationalised, highlighting a significant opportunity for threat intelligence automation. The findings, gathered from security professionals at InfoSec Europe 2025, expose critical gaps in the maturity and automation of legacy threat intelligence platform capabilities, as well as a growing appetite for AI-driven solutions to augment speed, context and actioning of threat intel.<\/span><\/p>\n<p><span style=\"font-family: georgia, palatino, serif; font-size: 12pt;\">Further survey results support this gap in operationalised threat intelligence, where 30% noted they are grappling with too many feeds with too little context, followed by a lack of automation\/playbooks capabilities at 29%, and insufficient dedicated staff at 18%. All of these challenges reflect the need for maturing and operationalising threat intelligence that can be addressed with an AI-driven, automation-rich threat intelligence platform (TIP).<\/span><\/p>\n<p><span style=\"font-family: georgia, palatino, serif; font-size: 12pt;\">Survey responses identified the most in-demand TIP capabilities as follows: automation (48%), contextualisation and enrichment (37%) and more accurate risk scoring (34%). \u201cWe are excited to see this validation, coming straight from security practitioners, for how we\u2019ve designed automation across the threat intelligence management lifecycle,\u201d said <strong>Anuj Goel, CEO and Co-founder of Cyware.<\/strong> \u201cOur unified threat intelligence solution automates ingestion, normalisation, de-duplication, enrichment and all the way through to threat actioning, facilitating and accelerating the full threat workflow.\u201d<\/span><\/p>\n<p><span style=\"font-family: georgia, palatino, serif; font-size: 12pt;\">The automation theme continued in survey results, with over half (51%) of cybersecurity professionals believing AI is best placed to automate triaging and prioritisation of threats. Cautious excitement exists with AI, where 61% said they would only trust AI agents to take limited autonomous actions (such as blocking IOCs or quarantining endpoints) provided there was still human oversight.<\/span><\/p>\n<p><span style=\"font-family: georgia, palatino, serif; font-size: 12pt;\">\u201cThe survey confirms what many in the industry are already feeling \u2013 that traditional approaches to threat intelligence are no longer enough,\u201d said <strong>Brett Candon, VP International at Cyware.<\/strong> \u201cSecurity teams need AI-powered tools that can enrich data with context, automate time-consuming workflows and support real-time decision making. The opportunity is an augmented system from AI and automation that maintains human verification or oversight while improving their capacity to defend against the volume and complexity of today\u2019s threats.\u201d<\/span><\/p>\n<p><strong><span style=\"font-family: georgia, palatino, serif; font-size: 12pt;\">Additional key research findings include:<\/span><\/strong><\/p>\n<ul class=\"bwlistdisc\">\n<li><span style=\"font-family: georgia, palatino, serif; font-size: 12pt;\">Only 20% of respondents said they are \u201cfully operationalised\u201d in their use of threat intelligence with response integration\u2013reflecting the gap in legacy TIP with current threat intelligence program requirements.<\/span><\/li>\n<li><span style=\"font-family: georgia, palatino, serif; font-size: 12pt;\">Of those using a legacy TIP, only 17% use it to automate response workflows and 27% to enrich incidents and alerts\u2013exposing untapped potential in modern TIPs.<\/span><\/li>\n<li><span style=\"font-family: georgia, palatino, serif; font-size: 12pt;\">Only 16% of TIP users are currently sharing intelligence with partners or peers, despite nearly 75% recognising a need to improve sharing practices\u2013further identifying opportunities with modern TIP capabilities.<\/span><\/li>\n<li><span style=\"font-family: georgia, palatino, serif; font-size: 12pt;\">Only 38% of organisations have a defined threat intel sharing process that includes their supply chain, suggesting a missed opportunity for building greater resilience through collaboration.<\/span><\/li>\n<li><span style=\"font-family: georgia, palatino, serif; font-size: 12pt;\">39% identified AI-assisted correlation of IOCs and TTPs as the most valuable capability in an AI-powered TIP.<\/span><\/li>\n<\/ul>\n<\/div>\n<\/div>\n<\/div>\n","protected":false},"excerpt":{"rendered":"<p>Cyware Survey at InfoSec Europe Reveals Industry Gap in Operationalising Threat Intelligence LONDON&#8211;(BUSINESS WIRE)&#8211;Cyware, the leader in threat intelligence management, security collaboration, and orchestrated response, today released new research revealing that a majority see the importance of having a Threat Intelligence Program and have started a Program. However, 80% of respondents recognise their threat intelligence [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":24382,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[16],"tags":[],"class_list":{"0":"post-356295","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-tech-knowledge"},"_links":{"self":[{"href":"https:\/\/www.technologyforyou.org\/wp-json\/wp\/v2\/posts\/356295","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.technologyforyou.org\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.technologyforyou.org\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.technologyforyou.org\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.technologyforyou.org\/wp-json\/wp\/v2\/comments?post=356295"}],"version-history":[{"count":0,"href":"https:\/\/www.technologyforyou.org\/wp-json\/wp\/v2\/posts\/356295\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.technologyforyou.org\/wp-json\/wp\/v2\/media\/24382"}],"wp:attachment":[{"href":"https:\/\/www.technologyforyou.org\/wp-json\/wp\/v2\/media?parent=356295"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.technologyforyou.org\/wp-json\/wp\/v2\/categories?post=356295"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.technologyforyou.org\/wp-json\/wp\/v2\/tags?post=356295"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}