Home » CTI


Cyber ​​Threat Intelligence (CTI) defines cyber threat research, analysis and modeling. It makes it possible to describe a threat or a computer attack through contextualized elements and/or indicators understandable by men or machines.

With the increase in ever more sophisticated cyber attacks, it has become essential to acquire and maintain knowledge of the threat and the attacker for companies and institutions. 

To understand these new challenges, François Deruty, Chief Operation Officer at Sekoia.io, gives us in this interview enlightened answers on what Cyber ​​Threat Intelligence CTI is.

What is Cyber ​​Threat Intelligence used for?

Threat intelligence is used to prevent and detect computer attacks. The CTI platform provides prior knowledge of this threat in order to anticipate it, i.e. take defensive countermeasures upstream and detect it in real time if necessary. 

“To give you an image, I will reinforce my front door to which I will add locks and cameras. These extra locks allow me to deal with actors trying to force her every day. The CTI is used to detect when this takes place, it is a means of anticipation allowing me to see that people are trying to enter my home. » François Deruty, COO Sekoia.io.

Going back to the computing environment, locks can be blacklists because we know that certain items are used daily by attackers, items that are not trusted, which we will either blacklist or quarantine, the time to verify that they are legit. The CTI platform is used to model this set and to understand and detect these events.

How to make the information usable?

Today, information is made usable first by contextualizing it as much as possible and modeling it in a format that is accepted by the greatest number of tools while making it quickly understandable by analysts (STIX is today the format that is most adopted by the community today).

The concrete impact of the use of CTI in a company

A well-made Cyber ​​Threat Intelligence platform allows the company to save time and peace of mind spirit

The enemy of the CTI being the false positive, this knowledge of the threat and the attacker must make it possible to ensure that the slightest alert is generated legitimately so as not to “drown” the analysts. The goal is to reduce the number of false positives, to drop below the 5% mark and thus only report real incident alerts.

Cyber ​​Threat Intelligence therefore brings real time savings for enterprise security teams. These soc teams are solicited on many subjects. The CTI allows these teams to generate tranquility and free time. A return on investment is therefore quantifiable very quickly.

Criteria for a quality CTI

Today, only one player has the capacity to provide a quality CTI. If the underlying question is to know “can a single actor make a CTI of so-called exhaustive quality?”. For this point, it is more difficult!

“To have the most exhaustive Cyber ​​Threat Intelligence platform possible, the fact of using several sources makes it possible to cross-reference information and thus have better confidence in the elements detected. If something is determined to be malicious and that information is confirmed by one or more other sources, we have a better chance that it is. At Sekoia.io, we use many data sources which give us elements allowing us to cross-reference information. We also create our CTI, by investigating and enriching the information at our disposal. This internal capacity is essential to create a quality CTI thanks to our dedicated team of analysts specialized in this field. » 

Does cybersecurity without CTI make sense?

“I don’t think so, but that’s my personal opinion. We cannot achieve optimal prevention and detection without threat intelligence. »

Information systems are constantly evolving, they are becoming very heterogeneous and are growing so quickly thatit has become impossible to have exhaustive knowledge of them in real time. Due to a changing environment, it is more effective to concentrate on knowledge of the threat, with specialized teams whose job it is to understand and analyze the various attack operating modes, in order to then decline and disseminate it within the various information systems to be protected.

Other definitions of cyber concepts, methods and tools are also available:

If you are visiting our website for the first time, know that we are a cybersecurity software publisher. We provide SOC and MSSP teams with a turnkey operational security platform (SOC platform). Through our XDR platformCTI tool and threat intelligence platform, we enable our users to neutralize cyber threats, regardless of the attack surface.


Others Terms

SOC(Security Operations Center)

Security Operations Center (SOC) is an organizational structure dedicated to the implementation of all the security operations of an organization against cyberattacks. These actions include the supervision and protection of an organization’s information system (workstations, networks, website, applications, databases, etc.)

XDR(eXtended Detection & Response)

XDR (eXtended Detection & Response) designates a holistic approach to cybersecurity operational. It stands out for its ability to consolidate and automate on a unified SaaS platform all data, analyzes and responses to cyber threats, regardless of their origin, supplier or specialization.

Échangez avec l’équipe

Vous souhaitez en savoir plus sur nos solutions de protection ?
Vous voulez découvrir nos produits de XDR et de CTI ?
Vous avez un projet de cybersécurité dans votre organisation ?
Prenez rendez-vous et rencontrons-nous !

Chat with our team !

Would you like to know more about our solutions ?
Do you want to discover our XDR and CTI products ?
Do you have a cyber security project in your organization ?
Make an appointment and meet us !