News

Cyware Survey Reveals 92% See Threat Intelligence as Critical, Yet Operationalization Remains a Challenge

May 23, 2025

Cyware, a leader in threat intelligence operationalization, released survey results revealing a significant gap between the perceived importance of threat intelligence and its actual operational implementation. The survey, conducted at RSA Conference 2025 with 100 cybersecurity professionals, highlights challenges in internal collaboration, tool integration, and automation within organizations.

1. Awareness vs. Operational Reality

  • 92% of respondents agree threat intelligence sharing is “absolutely crucial” or “very important.”
  • Only 13% feel their automation between CTI and SecOps tools works well.
  • Nearly 40% struggle to coordinate data across critical security tools like TIPs, SIEMs, and vulnerability management platforms.

2. AI Optimism and Implementation

  • 78% believe AI will improve threat intelligence sharing.
  • Only 43% report AI has made a meaningful impact so far.

3. Real-Time Threat Intelligence Sharing

  • Only 17% share threat intelligence across roles (SecOps, IR, vulnerability management) in real time.
  • 25% share daily, but 22% rarely or never share.

4. External Collaboration Challenges

  • 57% collaborate with industry peers to improve threat intel.
  • 30% are unsure if such collaboration exists.

5. Automation Gaps Persist

  • 56% face moderate to significant challenges automating workflows between CTI and SecOps.

6. ISAC Participation and Awareness

  • Only 18% confirmed participation in an ISAC or ISAO.
  • 45% don’t know if their organization is involved, potentially limiting access to sector-specific threat insights.

The Cyware survey underscores the urgent need to bridge the gap between the critical importance of threat intelligence and its practical implementation. As cyber threats increase in complexity, organizations must improve collaboration, automate workflows, and adopt AI-driven solutions. Cyware continues to support this evolution through unified threat ingestion, sharing, and response powered by AI and hyper-automation.

View News

Next Up