New solution taps into dark web, open-source, vulnerability, and threat actor intelligence to deliver risk mitigation and prevention across private and public sector security teams. Credit: Adam Le Sommer Threat intelligence firm Flashpoint has announced the release of Ignite, a new intelligence platform built to accelerate cross-functional risk mitigation and prevention across vulnerability management and security teams, including those in law enforcement, state and local government, and federal civilian agencies. Designed for practitioners, Ignite delivers real-time pictures of pertinent risks while reducing silos that can result from disparate intelligence feeds from multiple partners, helping organizations in the private and public sectors reduce exposure to cyber threats and tackle national security risks, Flashpoint said. The platform was announced during RSA Conference in San Francisco.The national security element is significant as geopolitical tensions and state-backed actors continue to pose notable threats and challenges to national and local governments.Ignite taps into dark web, open-source, threat actor visibilityIgnite uses visibility of the dark web, open-source/surface web, threat actor groups, vulnerabilities, breaches, and geospatial intelligence to deliver text, video, and image optical character recognition (OCR), news-style intelligence reports, and rule-based alerting via a personalized dashboard, Flashpoint said in a press release. Features built into Ignite include: Cyber threat intelligence allows analysts to search through thousands of sources, monitor the communication between illicit actors, and consume full intelligence reports.Vulnerability management provides vulnerability teams the contextual information needed to effectively identify, prioritize, and remediate vulnerabilities. This uses insights from publicly available CVEs and is mapped to related intelligence from threat actor communications and message boards, according to Flashpoint.National security intelligence combines open-source data collections with intelligence expertise, investigative tools, and AI enrichments to help government security and intelligence teams inform, operate, attack, defend, and influence. This is designed to deliver on-the-ground situational awareness to support mission-driven teams in defense, the intelligence community, law enforcement/public safety, state and local government, and federal civilian agencies.Physical security intelligence supports critical security workflows, empowering users to monitor key locations and assets, get real-time alerts about events, and investigate incidents.Future augmentations will soon be made available via the expansion of Flashpoint’s partnership with Google Cloud on industry-leading AI-driven innovations, which will support the delivery of generative AI to Flashpoint customers, Flashpoint said. Related content news analysis Rise of zero-day exploits reshape security recommendations Research from Rapid7 shows a spike in zero-days contributing to quicker exploit timelines, leaving IT security teams under strain with a greater need for post-incident response. By Lucian Constantin May 22, 2024 7 mins Incident Response Zero-day vulnerability Security Practices opinion Reducing CSO-CIO tension requires recognizing the signs Given competing pressures and priorities, CIOs and CISOs often find themselves at odds. Knowing where tensions flair and how your partner operates is essential to maintaining a productive partnership. By David Gee May 22, 2024 6 mins CIO CSO and CISO IT Leadership brandpost Sponsored by Cyber NewsWire Memcyco Report Reveals Only 6% Of Brands Can Protect Their Customers From Digital Impersonation Fraud By Cyber NewsWire - Paid Press Release May 21, 2024 4 mins Cyberattacks Security opinion Employee discontent: Insider threat No. 1 CISOs who focus only on detection technology — and don’t engage with the human side of the security equation — are missing a key ingredient for insider risk management. By Christopher Burgess May 21, 2024 7 mins CSO and CISO Threat and Vulnerability Management Human Resources PODCASTS VIDEOS RESOURCES EVENTS SUBSCRIBE TO OUR NEWSLETTER From our editors straight to your inbox Get started by entering your email address below. Please enter a valid email address Subscribe