Threat Maps
Cyber threats can be quite elusive and intangible: who are the people behind cyber-attacks and where are they targeting their attacks? With cyber attacks happening around the world and across the cyber connected world, threat intelligence, specifically threat maps, are a powerful way to make threats and attackers concrete.
Threat maps illustrate the millions of cyber threats happening every day. In addition to visualizing the attacks, cyber threat maps also provide a limited amount of context including the source and target countries, attack types, and historical and (near) real-time data about threats.
Not only are they fun to look at, but threat maps can be valuable to help your security team make connections and predictions on future attacks where your company may fall into the mix. Threat maps provide that visual connection that turns information into intelligence.
There a few different types of threat maps. Some display comprehensive information, some show limited amounts of data to narrow its scope. Some threat maps use a different timeframe when illustrating attacks, near real-time or historical.
Below, there are some of the best maps you can use to expand your threat intelligence arsenal.
1. The Kaspersky Cyberthreat Real-Time Map
The map’s default view shows attacks around the globe with options to rotate and zoom on a specific country to see nation-specific threat data.
Kaspersky uses multiple data sources – such as on-access scans, on-demand scans, botnet activity detection, and mail anti-virus – for the attacks.
If you head inside the “Statistics” tab, you can get useful insights from historical data sets, such as the top threat types and the most infected countries.
2. Fortinet
Fortinet’s threat map solution shows a log of threat types, their severity, and their target locations. With a click, you can display country-specific details in the form of a chart.
3. Bitdefender
Anti-virus maker Bitdefender has also created a threat map that features infections, attacks, and spam. Bitdefender claims that the threat map displays attacks in real-time.