{"id":10763,"date":"2024-04-05T15:01:44","date_gmt":"2024-04-05T13:01:44","guid":{"rendered":"https:\/\/sits.com\/threat-intelligence-knowledge-is-power-security\/"},"modified":"2024-11-22T11:29:43","modified_gmt":"2024-11-22T10:29:43","slug":"threat-intelligence-knowledge-is-power-security","status":"publish","type":"post","link":"https:\/\/sits.friendventure.dev\/da\/blog\/threat-intelligence-knowledge-is-power-security\/","title":{"rendered":"Threat Intelligence &#8211; Viden er magt og sikkerhed"},"content":{"rendered":"<section class=\"wpb-content-wrapper\"><p>[vc_row][vc_column][vc_column_text]Threat Intelligence (TI), ogs\u00e5 kendt som Cyber Threat Intelligence (CTI), giver detaljerede og brugbare oplysninger til at hj\u00e6lpe virksomheder og organisationer med at forebygge og bek\u00e6mpe cyber sikkerhedstrusler. TI omfatter detaljerede, brugbare trusselsoplysninger, som g\u00f8r det muligt for sikkerhedsteams at handle proaktivt. TI kan bruges til at foretage kontrollerede og manuelle handlinger for at forhindre cyberangreb, f\u00f8r de finder sted. Desuden hj\u00e6lper trusselsinformationerne med at detektere og reagere p\u00e5 angreb hurtigere.[\/vc_column_text]<div class=\"smx_global_spacer size-s\"><\/div>\n<h2  class=\"h2 smx-headline \">Hvorfor er Threat Intelligence s\u00e5 vigtigt?<\/h2>[vc_column_text]Kun med opdaterede og detaljerede oplysninger kan sikkerhedsl\u00f8sninger, som f.eks. en endpoint detection and response-l\u00f8sning (EDR), vide, hvilke omr\u00e5der af et virksomhedsnetv\u00e6rk der i \u00f8jeblikket er i angribernes fokus, f\u00f8r et angreb finder sted. Ud over EDR bruger NDR-, SIEM- eller XDR-l\u00f8sninger ogs\u00e5 disse data til at forbedre deres forsvar.<\/p>\n<p>Men god trusselsinformation er ikke kun vigtig for sikkerhedsl\u00f8sninger. En virksomheds SOC-team og deres threat hunters bruger ogs\u00e5 de detaljerede oplysninger til direkte at identificere s\u00e5rbarheder i virksomhedens netv\u00e6rk og iv\u00e6rks\u00e6tte passende modforanstaltninger. Hvis en virksomhed benytter sig af et managed SOC-team, bruger dette team ogs\u00e5 threat intelligence.[\/vc_column_text]<div class=\"smx_global_spacer size-s\"><\/div>\n<h2  class=\"h2 smx-headline \">Kilder til Threat Intelligence (TI)<\/h2>[vc_column_text]Sikkerhedsanalytikere skaber threat intelligence ved at indsamle \"r\u00e5\" trusselsdata fra forskellige kilder. Derefter korrelerer og analyserer de disse data for at afd\u00e6kke tendenser, m\u00f8nstre og relationer i forbindelse med faktiske eller potentielle trusler.<\/p>\n<p>En platform, der giver s\u00e5danne oplysninger, er for eksempel <a href=\"https:\/\/portal.av-atlas.org\/\">AV-ATLAS<\/a>. Den indeholder de analyserede trusselsdata, der er indsamlet af AV-TEST-eksperter og leveret af instituttets analysesystemer. Den grundl\u00e6ggende version af platformen er gratis tilg\u00e6ngelig for alle og viser et imponerende udvalg af de tilg\u00e6ngelige TI-data. For virksomheder giver systemet ogs\u00e5 trusselsinformationsfeeds, der kan knyttes til sikkerhedsl\u00f8sninger eller bruges af Threat Hunter med passende v\u00e6rkt\u00f8jer.<\/p>\n<p><em>Som Maik Morgenstern, CTO hos AV-TEST og selv threat hunter, p\u00e5peger: \"God trusselsinformation, f.eks. i form af IoC - Indicators of Compromise - er essentiel for sikkerhedsl\u00f8sninger og threat hunters, n\u00e5r de skal evaluere en potentiel h\u00e6ndelse. Ved hj\u00e6lp af de TTP'er - Tactics, Techniques, and Procedures - der er indeholdt i TI, kan en forsvarsstrategi for IT-sikkerhed planl\u00e6gges og implementeres p\u00e5 en p\u00e5lidelig m\u00e5de.\"<\/em><\/p>\n<p>Andre kilder til trusselsinformation er <a href=\"https:\/\/www.av-test.org\/da\/news\/cyber-incidents-in-numbers-year-2023\/\">CTI-rapporter, f.eks. fra AV-TEST<\/a>, som beskriver sikkerhedslandskabet i korte tidsintervaller, i dette tilf\u00e6lde ugentligt, og rapporterer om angrebskampagner fra APT-grupper. Men rapporter, der d\u00e6kker lange tidsperioder, som <a href=\"https:\/\/pages.checkpoint.com\/cyber-security-report-2023.html\">Check Point Softwares 2023 Cyber Security Report<\/a>, giver ogs\u00e5 vigtige trusselsoplysninger i et internationalt resum\u00e9. Rapporten identificerer tendenser, s\u00e6rligt s\u00e5rbare sektorer, hyppigt anvendte angrebsv\u00e6rkt\u00f8jer og -taktikker samt baggrundsinformation om netv\u00e6rks- og cloud-angreb. Mindre globalt fokuseret, men ikke mindre informativ, er den aktuelle AV-TEST-rapport \"Cyber Incidents in Figures: The year 2023\", som kan downloades gratis.[\/vc_column_text]<div class=\"smx_global_spacer size-s\"><\/div>\n<h2  class=\"h2 smx-headline \">Hvad er der i Threat Intelligence?<\/h2>[vc_column_text]Nogle af de tilg\u00e6ngelige trusselsinformationsfeeds har forskelligt indhold. Nogle af n\u00f8glekomponenterne er:<\/p>\n<ul>\n<li><strong>Trusler, der p\u00e5virker virksomheder: <\/strong>Dette involverer normalt aktuelle kampagner mod specifikke brancher, f.eks. deres supply chain, som er i fokus for angriberne, og den m\u00e5de, hvorp\u00e5 disse angreb udf\u00f8res<strong>. <\/strong><\/li>\n<li><strong>Trusselakt\u00f8rer: <\/strong>Baggrundsdata om APT-grupper og andre angribere kan bruges til at udvikle forsvarsstrategier baseret p\u00e5 deres tidligere handlinger.<\/li>\n<li><strong>TTP'er - Taktik, teknikker og procedurer: <\/strong>TTP giver oplysninger om teknikker og v\u00e6rkt\u00f8jer, som angriberne bruger i deres kampagner.<\/li>\n<li><strong>IoC'er - Indicators of Compromise: <\/strong>Disse data identificerer signaler eller mist\u00e6nkelige processer, der kan bruges til at opdage og identificere et cyberangreb.<\/li>\n<li><strong>Evaluerede datastr\u00f8mme og filer: <\/strong>Fra et feed med farlige URL'er f\u00e5r en endpoint-sikkerhedsl\u00f8sning f.eks. EDR. Baseret p\u00e5 opdaterede oplysninger forhindrer det virksomhedens medarbejdere i at tilg\u00e5 farlige hjemmesider eller foretage downloads, der er klassificeret som farlige.<\/li>\n<li><strong>S\u00e5rbarhedsvurderinger: <\/strong>Oplysninger om nye s\u00e5rbarheder, som der endnu ikke er patches til, men som der allerede findes en gennemgang af eller forel\u00f8bige beskyttelsesforanstaltninger for, f.eks. blokering af en netv\u00e6rksport eller nedgradering af brugerrettigheder.<\/li>\n<\/ul>\n<p>[\/vc_column_text]<div class=\"smx_global_spacer size-s\"><\/div>\n<h2  class=\"h2 smx-headline \">De forskellige typer af Threat Intelligence<\/h2>[vc_column_text]Eksperter opdeler ofte trusselsinformation i tre kategorier: strategisk, taktisk og operationel. Da disse klassifikationer ikke er standardiserede, varierer underpunkterne noget inden for kategorierne afh\u00e6ngigt af den ekspert, der arbejder med dem. De er typisk opdelt som f\u00f8lger:<\/p>\n<ul>\n<li><strong>Efterretninger om strategiske trusler: <\/strong>Denne analyse er meget kortfattet og henvender sig til ikke-eksperter, f.eks. bestyrelsesmedlemmer. Fokus er kun p\u00e5 truede omr\u00e5der. Analysen fokuserer ogs\u00e5 p\u00e5 aktuelle tendenser, som ofte stammer fra offentlige rapporter. Analysen er en slags risikobarometer.<\/li>\n<li><strong>Taktisk efterretning om trusler: <\/strong>De f\u00f8rste praktiske skridt er allerede taget, og IoC'er bruges f.eks. til at kontrollere netv\u00e6rk og forhindre potentielle angreb. Oplysningerne kommer normalt via et TI- eller CTI-feed og behandles generelt automatisk.<\/li>\n<li><strong>Operationel efterretning om trusler: <\/strong>Denne del refererer til TI under og efter et angreb. Aktuelle oplysninger om angribernes taktik, teknikker og procedurer (TTP) evalueres og bruges. Men der skal ogs\u00e5 drages konklusioner, efter at angrebet er blevet forhindret, f.eks. om angrebsm\u00e5l: Var angriberne ude efter specifikke data, og i s\u00e5 fald hvilke? Eller er angrebet muligvis kun en test af de enkelte forsvars mekanismer, og det egentlige angreb er stadig i vente?<\/li>\n<\/ul>\n<p>[\/vc_column_text]<div class=\"smx_global_spacer size-s\"><\/div>\n<h2  class=\"h2 smx-headline \">Livscyklus for threat intelligence<\/h2>[vc_column_text]<\/p>\n<ul>\n<li>N\u00e5r sikkerhedseksperter taler om en cybertrussels livscyklus, mener de en opdeling i f\u00f8lgende \"trusselsfaser\":<\/li>\n<li>Planl\u00e6gning<\/li>\n<li>Indsamling<\/li>\n<li>Bearbejdning<\/li>\n<li>Analyse<\/li>\n<li>Formidling<\/li>\n<li>Feedback<\/li>\n<\/ul>\n<p>Denne proces er ikke en engangsforeteelse, men b\u00f8r genneml\u00f8bes gentagne gange for at sikre et perfekt og omkostningseffektivt cyberforsvar.<\/p>\n<p>I \"Direction\"-fasen er det vigtigt at opstille m\u00e5l for threat intelligence, f.eks. hvilke dele af virksomheden der kr\u00e6ver s\u00e6rlig beskyttelse, og hvilke konsekvenser et angreb kan f\u00e5.<\/p>\n<p>I den anden fase, \"Detection\", defineres de data- og IT-omr\u00e5der, der blev identificeret som s\u00e6rligt udsatte i den f\u00f8rste fase. I denne fase b\u00f8r en virksomhed beslutte sig for datakilderne til sin fremtidige threat intelligence, f.eks. rapporter, blogs, CTI-feeds fra sikkerhedsudbydere eller metadata fra sit eget netv\u00e6rk, f.eks. fra EDR eller SIEM.<\/p>\n<p>I den tredje fase, \"Processing\", skal det afklares, hvordan informationsstr\u00f8mmen kan behandles p\u00e5 en praktisk gennemf\u00f8rlig m\u00e5de. Kan tilg\u00e6ngelige systemer allerede behandle disse feeds direkte, og har SOC'en og threat hunterne de rigtige v\u00e6rkt\u00f8jer?<\/p>\n<p>N\u00e5r dette er afklaret, g\u00e5r vi videre til fase 4, \"Analyse\". Her evaluerer vi oplysningerne og omdanner dem til praktisk anvendelige resultater. Resultaterne af denne analyse viser ogs\u00e5 tydeligt, om der stadig mangler vigtige sikkerhedsv\u00e6rkt\u00f8jer, og om det nuv\u00e6rende sikkerhedsbudget er tilstr\u00e6kkeligt.<\/p>\n<p>Fase 5 og 6, \"Distribution\" og \"Feedback\", bruger de faktiske resultater af livscyklussen for trusselsinformation. Konklusionerne skal implementeres i de forskellige teams i en virksomhed, f.eks. SOC og den traditionelle it-afdeling. Virksomhedens ledelsen b\u00f8r dog ogs\u00e5 v\u00e6re involveret i disse faser. I feedbackfasen skal de ansvarlige afdelinger og projektledere sikre, at alle faser er blevet implementeret p\u00e5 en m\u00e5de, der giver mening i forhold til sikkerhedskrav og -m\u00e5l.[\/vc_column_text][\/vc_column][\/vc_row]<\/p>\n<\/section>","protected":false},"excerpt":{"rendered":"<p>[vc_row][vc_column][vc_column_text]Threat Intelligence (TI), ogs\u00e5 kendt som Cyber Threat Intelligence (CTI), giver detaljerede og brugbare oplysninger til at hj\u00e6lpe virksomheder og organisationer med at forebygge og bek\u00e6mpe cyber sikkerhedstrusler. TI omfatter detaljerede, brugbare trusselsoplysninger, som g\u00f8r det muligt for sikkerhedsteams at handle proaktivt. TI kan bruges til at foretage kontrollerede og manuelle handlinger for at forhindre [&hellip;]<\/p>\n","protected":false},"author":4,"featured_media":10393,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"inline_featured_image":false,"footnotes":""},"categories":[313],"tags":[],"class_list":["post-10763","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cyber-defense-en-da"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v24.9 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Threat Intelligence - Viden er magt og sikkerhed | SITS<\/title>\n<meta name=\"description\" content=\"Threat Intelligence - Viden er magt og sikkerhed \u00bb Jetzt informieren!\" \/>\n<meta name=\"robots\" content=\"noindex, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<meta property=\"og:locale\" content=\"da_DK\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Threat Intelligence - Viden er magt og sikkerhed | SITS\" \/>\n<meta property=\"og:description\" content=\"Threat Intelligence - Viden er magt og sikkerhed \u00bb Jetzt informieren!\" \/>\n<meta property=\"og:url\" content=\"https:\/\/sits.friendventure.dev\/da\/blog\/threat-intelligence-knowledge-is-power-security\/\" \/>\n<meta property=\"og:site_name\" content=\"SITS\" \/>\n<meta property=\"article:published_time\" content=\"2024-04-05T13:01:44+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-11-22T10:29:43+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/FAQ-Element_Cyber_Defense.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1193\" \/>\n\t<meta property=\"og:image:height\" content=\"1440\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"ilackinger\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Skrevet af\" \/>\n\t<meta name=\"twitter:data1\" content=\"ilackinger\" \/>\n\t<meta name=\"twitter:label2\" content=\"Estimeret l\u00e6setid\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutter\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/sits.friendventure.dev\/da\/blog\/threat-intelligence-knowledge-is-power-security\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/sits.friendventure.dev\/da\/blog\/threat-intelligence-knowledge-is-power-security\/\"},\"author\":{\"name\":\"ilackinger\",\"@id\":\"https:\/\/sits.friendventure.dev\/da\/#\/schema\/person\/1c8a57badeeb21935ae47de41016610d\"},\"headline\":\"Threat Intelligence &#8211; Viden er magt og sikkerhed\",\"datePublished\":\"2024-04-05T13:01:44+00:00\",\"dateModified\":\"2024-11-22T10:29:43+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/sits.friendventure.dev\/da\/blog\/threat-intelligence-knowledge-is-power-security\/\"},\"wordCount\":1290,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/sits.friendventure.dev\/da\/#organization\"},\"image\":{\"@id\":\"https:\/\/sits.friendventure.dev\/da\/blog\/threat-intelligence-knowledge-is-power-security\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/FAQ-Element_Cyber_Defense.jpg\",\"articleSection\":[\"Cyber Defense\"],\"inLanguage\":\"da-DK\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/sits.friendventure.dev\/da\/blog\/threat-intelligence-knowledge-is-power-security\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/sits.friendventure.dev\/da\/blog\/threat-intelligence-knowledge-is-power-security\/\",\"url\":\"https:\/\/sits.friendventure.dev\/da\/blog\/threat-intelligence-knowledge-is-power-security\/\",\"name\":\"Threat Intelligence - Viden er magt og sikkerhed | SITS\",\"isPartOf\":{\"@id\":\"https:\/\/sits.friendventure.dev\/da\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/sits.friendventure.dev\/da\/blog\/threat-intelligence-knowledge-is-power-security\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/sits.friendventure.dev\/da\/blog\/threat-intelligence-knowledge-is-power-security\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/FAQ-Element_Cyber_Defense.jpg\",\"datePublished\":\"2024-04-05T13:01:44+00:00\",\"dateModified\":\"2024-11-22T10:29:43+00:00\",\"description\":\"Threat Intelligence - Viden er magt og sikkerhed \u00bb Jetzt informieren!\",\"breadcrumb\":{\"@id\":\"https:\/\/sits.friendventure.dev\/da\/blog\/threat-intelligence-knowledge-is-power-security\/#breadcrumb\"},\"inLanguage\":\"da-DK\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/sits.friendventure.dev\/da\/blog\/threat-intelligence-knowledge-is-power-security\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"da-DK\",\"@id\":\"https:\/\/sits.friendventure.dev\/da\/blog\/threat-intelligence-knowledge-is-power-security\/#primaryimage\",\"url\":\"https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/FAQ-Element_Cyber_Defense.jpg\",\"contentUrl\":\"https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/FAQ-Element_Cyber_Defense.jpg\",\"width\":1193,\"height\":1440},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/sits.friendventure.dev\/da\/blog\/threat-intelligence-knowledge-is-power-security\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Startseite\",\"item\":\"https:\/\/sits.friendventure.dev\/da\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Threat Intelligence &#8211; Viden er magt og sikkerhed\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/sits.friendventure.dev\/da\/#website\",\"url\":\"https:\/\/sits.friendventure.dev\/da\/\",\"name\":\"SITS\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/sits.friendventure.dev\/da\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/sits.friendventure.dev\/da\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"da-DK\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/sits.friendventure.dev\/da\/#organization\",\"name\":\"SITS\",\"url\":\"https:\/\/sits.friendventure.dev\/da\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"da-DK\",\"@id\":\"https:\/\/sits.friendventure.dev\/da\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/sits-logo-new.svg\",\"contentUrl\":\"https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/sits-logo-new.svg\",\"width\":557,\"height\":322,\"caption\":\"SITS\"},\"image\":{\"@id\":\"https:\/\/sits.friendventure.dev\/da\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/sits.friendventure.dev\/da\/#\/schema\/person\/1c8a57badeeb21935ae47de41016610d\",\"name\":\"ilackinger\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"da-DK\",\"@id\":\"https:\/\/sits.friendventure.dev\/da\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/4374b5318c3e575f35b3cfa5e1c98e1d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/4374b5318c3e575f35b3cfa5e1c98e1d?s=96&d=mm&r=g\",\"caption\":\"ilackinger\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Threat Intelligence - Viden er magt og sikkerhed | SITS","description":"Threat Intelligence - Viden er magt og sikkerhed \u00bb Jetzt informieren!","robots":{"index":"noindex","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"og_locale":"da_DK","og_type":"article","og_title":"Threat Intelligence - Viden er magt og sikkerhed | SITS","og_description":"Threat Intelligence - Viden er magt og sikkerhed \u00bb Jetzt informieren!","og_url":"https:\/\/sits.friendventure.dev\/da\/blog\/threat-intelligence-knowledge-is-power-security\/","og_site_name":"SITS","article_published_time":"2024-04-05T13:01:44+00:00","article_modified_time":"2024-11-22T10:29:43+00:00","og_image":[{"width":1193,"height":1440,"url":"https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/FAQ-Element_Cyber_Defense.jpg","type":"image\/jpeg"}],"author":"ilackinger","twitter_card":"summary_large_image","twitter_misc":{"Skrevet af":"ilackinger","Estimeret l\u00e6setid":"5 minutter"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/sits.friendventure.dev\/da\/blog\/threat-intelligence-knowledge-is-power-security\/#article","isPartOf":{"@id":"https:\/\/sits.friendventure.dev\/da\/blog\/threat-intelligence-knowledge-is-power-security\/"},"author":{"name":"ilackinger","@id":"https:\/\/sits.friendventure.dev\/da\/#\/schema\/person\/1c8a57badeeb21935ae47de41016610d"},"headline":"Threat Intelligence &#8211; Viden er magt og sikkerhed","datePublished":"2024-04-05T13:01:44+00:00","dateModified":"2024-11-22T10:29:43+00:00","mainEntityOfPage":{"@id":"https:\/\/sits.friendventure.dev\/da\/blog\/threat-intelligence-knowledge-is-power-security\/"},"wordCount":1290,"commentCount":0,"publisher":{"@id":"https:\/\/sits.friendventure.dev\/da\/#organization"},"image":{"@id":"https:\/\/sits.friendventure.dev\/da\/blog\/threat-intelligence-knowledge-is-power-security\/#primaryimage"},"thumbnailUrl":"https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/FAQ-Element_Cyber_Defense.jpg","articleSection":["Cyber Defense"],"inLanguage":"da-DK","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/sits.friendventure.dev\/da\/blog\/threat-intelligence-knowledge-is-power-security\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/sits.friendventure.dev\/da\/blog\/threat-intelligence-knowledge-is-power-security\/","url":"https:\/\/sits.friendventure.dev\/da\/blog\/threat-intelligence-knowledge-is-power-security\/","name":"Threat Intelligence - Viden er magt og sikkerhed | SITS","isPartOf":{"@id":"https:\/\/sits.friendventure.dev\/da\/#website"},"primaryImageOfPage":{"@id":"https:\/\/sits.friendventure.dev\/da\/blog\/threat-intelligence-knowledge-is-power-security\/#primaryimage"},"image":{"@id":"https:\/\/sits.friendventure.dev\/da\/blog\/threat-intelligence-knowledge-is-power-security\/#primaryimage"},"thumbnailUrl":"https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/FAQ-Element_Cyber_Defense.jpg","datePublished":"2024-04-05T13:01:44+00:00","dateModified":"2024-11-22T10:29:43+00:00","description":"Threat Intelligence - Viden er magt og sikkerhed \u00bb Jetzt informieren!","breadcrumb":{"@id":"https:\/\/sits.friendventure.dev\/da\/blog\/threat-intelligence-knowledge-is-power-security\/#breadcrumb"},"inLanguage":"da-DK","potentialAction":[{"@type":"ReadAction","target":["https:\/\/sits.friendventure.dev\/da\/blog\/threat-intelligence-knowledge-is-power-security\/"]}]},{"@type":"ImageObject","inLanguage":"da-DK","@id":"https:\/\/sits.friendventure.dev\/da\/blog\/threat-intelligence-knowledge-is-power-security\/#primaryimage","url":"https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/FAQ-Element_Cyber_Defense.jpg","contentUrl":"https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/FAQ-Element_Cyber_Defense.jpg","width":1193,"height":1440},{"@type":"BreadcrumbList","@id":"https:\/\/sits.friendventure.dev\/da\/blog\/threat-intelligence-knowledge-is-power-security\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Startseite","item":"https:\/\/sits.friendventure.dev\/da\/"},{"@type":"ListItem","position":2,"name":"Threat Intelligence &#8211; Viden er magt og sikkerhed"}]},{"@type":"WebSite","@id":"https:\/\/sits.friendventure.dev\/da\/#website","url":"https:\/\/sits.friendventure.dev\/da\/","name":"SITS","description":"","publisher":{"@id":"https:\/\/sits.friendventure.dev\/da\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/sits.friendventure.dev\/da\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"da-DK"},{"@type":"Organization","@id":"https:\/\/sits.friendventure.dev\/da\/#organization","name":"SITS","url":"https:\/\/sits.friendventure.dev\/da\/","logo":{"@type":"ImageObject","inLanguage":"da-DK","@id":"https:\/\/sits.friendventure.dev\/da\/#\/schema\/logo\/image\/","url":"https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/sits-logo-new.svg","contentUrl":"https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/sits-logo-new.svg","width":557,"height":322,"caption":"SITS"},"image":{"@id":"https:\/\/sits.friendventure.dev\/da\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/sits.friendventure.dev\/da\/#\/schema\/person\/1c8a57badeeb21935ae47de41016610d","name":"ilackinger","image":{"@type":"ImageObject","inLanguage":"da-DK","@id":"https:\/\/sits.friendventure.dev\/da\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/4374b5318c3e575f35b3cfa5e1c98e1d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/4374b5318c3e575f35b3cfa5e1c98e1d?s=96&d=mm&r=g","caption":"ilackinger"}}]}},"_links":{"self":[{"href":"https:\/\/sits.friendventure.dev\/da\/wp-json\/wp\/v2\/posts\/10763","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/sits.friendventure.dev\/da\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/sits.friendventure.dev\/da\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/sits.friendventure.dev\/da\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/sits.friendventure.dev\/da\/wp-json\/wp\/v2\/comments?post=10763"}],"version-history":[{"count":4,"href":"https:\/\/sits.friendventure.dev\/da\/wp-json\/wp\/v2\/posts\/10763\/revisions"}],"predecessor-version":[{"id":18114,"href":"https:\/\/sits.friendventure.dev\/da\/wp-json\/wp\/v2\/posts\/10763\/revisions\/18114"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/sits.friendventure.dev\/da\/wp-json\/wp\/v2\/media\/10393"}],"wp:attachment":[{"href":"https:\/\/sits.friendventure.dev\/da\/wp-json\/wp\/v2\/media?parent=10763"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/sits.friendventure.dev\/da\/wp-json\/wp\/v2\/categories?post=10763"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/sits.friendventure.dev\/da\/wp-json\/wp\/v2\/tags?post=10763"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}