Threat Intelligence: Critical in the fight against cyber attacks, but tough to master
Discover why many claim Threat Intelligence is extremely important in protecting their company and data


What drives your threat intelligence strategy?
According to a recent research study, nearly two out of three respondents (62%) said their fear of ransomware attacks was the top strategic driver of their threat intelligence strategies, followed by regulatory requirements (48%) and recommendations from industry experts (39%).
Download this report to learn:
- How to use threat intelligence to fight ransomware attacks
- How threat intelligence data is used at all defense levels
- and How real-time threat data can give you an advantage.
Provided by Mimecast
Get the ITPro daily newsletter
Sign up today and you will receive a free copy of our Future Focus 2025 report - the leading guidance on AI, cybersecurity and other IT challenges as per 700+ senior executives
ITPro is a global business technology website providing the latest news, analysis, and business insight for IT decision-makers. Whether it's cyber security, cloud computing, IT infrastructure, or business strategy, we aim to equip leaders with the data they need to make informed IT investments.
For regular updates delivered to your inbox and social feeds, be sure to sign up to our daily newsletter and follow on us LinkedIn and Twitter.
-
RSAC Conference 2025: The front line of cyber innovation
ITPro Podcast Ransomware, quantum computing, and an unsurprising focus on AI were highlights of this year's event
-
Anthropic CEO Dario Amodei thinks we're burying our heads in the sand on AI job losses
News With AI set to hit entry-level jobs especially, some industry execs say clear warning signs are being ignored
-
‘States don’t do hacking for fun’: NCSC expert urges businesses to follow geopolitics as defensive strategy
News Paul Chichester, director of operations at the UK’s National Cyber Security Centre, urged businesses to keep closer tabs on geopolitical events to gauge potential cyber threats.
-
Three ways to evolve your security operations
Whitepaper Why current approaches aren’t working
-
Beat cyber criminals at their own game
Whitepaper A guide to winning the vulnerability race and protection your organization
-
Quantifying the public vulnerability market: 2022 edition
Whitepaper An analysis of vulnerability disclosures, impact severity, and product analysis
-
Same cyberthreat, different story
Whitepaper How security, risk, and technology asset management teams collaborate to easily manage vulnerabilities
-
Business value of ServiceNow security operations
Whitepaper Experience transformational gains from automating workflows and data-sharing among IT, security, and risk teams to rapidly remediate threats
-
Cybercriminals are resilient. How about you?
Whitepaper Stay ahead of those agile bad actors
-
State of ransomware readiness 2022
Whitepaper Reducing the personal and business cost