EconPapers    
Economics at your fingertips  
 

Cyber threat intelligence in practice: Implications of the blurred lines between public and private intelligence activity

Neil Ashdown and Keith Martin
Additional contact information
Neil Ashdown: Royal Holloway, UK
Keith Martin: Information Security Group, UK

Cyber Security: A Peer-Reviewed Journal, 2025, vol. 8, issue 3, 264-272

Abstract: Intelligence is recognised as crucial for strengthening organisational security, particularly in the cyber domain. Companies have developed their own intelligence capabilities to address this requirement. Cyber threat intelligence (CTI) has historically been understood as a primarily technical, politically neutral practice. In contrast, this paper argues that CTI is socio-technical, collaborative and political. Interviews with industry and government practitioners were undertaken to better understand how CTI practitioners viewed their work. The findings underlined the importance of personal trusted relationships and collaboration. Companies were found to be working closely with government, often in ad hoc and informal ways. Moreover, the public and private sector were viewed as having different, complementary forms of visibility into the cyber domain. Together, this has contributed to a blurring of the lines between public and private organisations. These findings suggest that companies should promote trusted personal relationships through a combination of formal and less formal methods. At the same time, companies should be alive to the risks inherent in conducting intelligence activities in ‘operational intimacy’ with state actors, particularly in a period of increasing geopolitical competition and conflict.

Keywords: intelligence; cyber security; cyber threat intelligence; public–private collaboration; geopolitics (search for similar items in EconPapers)
JEL-codes: M15 (search for similar items in EconPapers)
Date: 2025
References: Add references at CitEc
Citations:

Downloads: (external link)
https://hstalks.com/article/9019/download/ (application/pdf)
https://hstalks.com/article/9019/ (text/html)
Requires a paid subscription for full access.

Related works:
This item may be available elsewhere in EconPapers: Search for items with the same title.

Export reference: BibTeX RIS (EndNote, ProCite, RefMan) HTML/Text

Persistent link: https://EconPapers.repec.org/RePEc:aza:csj000:y:2025:v:8:i:3:p:264-272

Access Statistics for this article

More articles in Cyber Security: A Peer-Reviewed Journal from Henry Stewart Publications
Bibliographic data for series maintained by Henry Stewart Talks ().

 
Page updated 2025-03-19
Handle: RePEc:aza:csj000:y:2025:v:8:i:3:p:264-272