Cybersecurity News. PHOTO: Cybercrime Magazine.

Blueprint For Building Or Strengthening A Modern Cyber Threat Intelligence Program

This week in cybersecurity from the editors at Cybercrime Magazine

Sausalito, Calif. – Nov. 12, 2025

Read the full story from ISACA 

It is no secret that many enterprises have struggled to derive measurable value from their threat intelligence programs.

In a recent study commissioned by Google Cloud, which surveyed more than 1,500 IT and cybersecurity professionals, 61 percent reported being overwhelmed by the number of threat intelligence feeds, 59 percent cited challenges in making intelligence actionable, and 59 percent struggled to verify the validity or relevance of threats. These challenges result in millions of dollars in wasted resources and leave enterprises exposed to preventable risk.

One of the key drivers of cyberthreat intelligence is the rapidly evolving nature of the cybercrime ecosystem. Building an effective threat intelligence program is inseparable from the frenetic pace of change as the business of cybercrime matures. Cybersecurity Ventures estimates that cybercrime will cost the global economy $10.5 trillion USD in 2025.

A new white paper from ISACA, “Building a Threat-Led Cybersecurity Program with Cyberthreat Intelligence,” provides executives, CISOs, security managers, and information security teams a practical blueprint for building or strengthening a modern threat intelligence program.

Done well, threat intelligence tells security where to harden controls, product where to close high‑impact weaknesses, procurement where to impose conditions on third parties, and executives where to invest.

Read the Full Story



Cybercrime Magazine is Page ONE for Cybersecurity. Go to any of our sections to read the latest:

  • SCAM. The latest schemes, frauds, and social engineering attacks being launched on consumers globally.
  • NEWS. Breaking coverage on cyberattacks and data breaches, and the most recent privacy and security stories.
  • HACK. Another organization gets hacked every day. We tell you who, what, where, when, and why.
  • VC. Cybersecurity venture capital deal flow with the latest investment activity from various sources around the world.
  • M&A. Cybersecurity mergers and acquisitions including big tech, pure cyber, product vendors and professional services.
  • BLOG. What’s happening at Cybercrime Magazine. Plus the stories that don’t make headlines (but maybe they should).
  • PRESS. Cybersecurity industry news and press releases in real time from the editors at Business Wire.
  • PODCAST. New episodes daily on the Cybercrime Magazine Podcast feature victims, law enforcement, vendors, and cybersecurity experts.
  • RADIO. Tune into WCYB Digital Radio at Cybercrime.Radio, the first and only round-the-clock internet radio station devoted to cybersecurity.

Contact us to send story tips, feedback and suggestions, and for sponsorship opportunities and custom media productions.