Cegeka_Logo Careers Language Solutions Back
Solutions
Hybrid Cloud

Hybrid Cloud

Explore the added value of cloud adoption for your business.

Data solution

Data & AI

Discover our different data solutions to help you become a data-driven company.

RegulatoryCompliance_Visuals_Navigation (1)

Regulatory Compliance

Ensure GDPR & GxP compliance with our comprehensive solutions.

Cyber Security & Networking Solution

Cyber Security & Networking

With cyber resilience, your organisation becomes a bit more secure with each day.

Digital Workplace Solution

Digital Workplace

Hybrid workplaces that increases productivity and reduces costs.

Testing_Visuals_IconNavigation (1)

Quality Engineering

Ensuring seamless software, one Test at a time.

Cegeka Application Services

Cegeka Application Services

Building the applications to embed growth, innovation and agility.

Business Applications

Business Applications

Transform your business with Microsoft Dynamics ERP and CRM, integrated with Microsoft’s Power Platform.

5G_Citymesh

5G & Mobile Private Networks

Expertise and development experience to bring all the advantages of 5G.

Products and platform solutions

Products & Platforms

Software solutions that optimize business processes and drive success.

Services Back
Services
Website_Navigation_IT_Team_Extension_3

IT Team Extension

The best IT professionals to support your projects.

Outsourcing Services

Outsourcing & Managed Services

Outsourcing your IT helps you to focus on your strategy.

Website_Navigation_Consultancy

Consultancy

The right skills and attitude to support the IT projects at your office

Website_Navigation_Projects

Projects

Integrating the right digital solutions for your IT project

Industries Back
Industries

Our industry-tailored services are designed to address specific challenges and opportunities across different industries.

All industries
Website_Navigation_Agriculture

Agriculture

Cegeka has a deep understanding of the agri and food ecosystem and the opportunities it creates.

food-80-80

Food

Streamline operations, ensure traceability and maintain compliance.

Energy & Utilities

Energy & Utilities

The arrival of smart electricity grids will allow companies to take care of their own energy management

pharma-icon-80-80

Pharma & Life Sciences

Face the increasingly complex challenges in Pharma & life sciences with confidence.

Manufacturing

Manufacturing

Production chains are becoming intelligent networks with real-time track-and-trace systems.

Website_Navigation_Mobility

Mobility

Offer citizens, businesses and visitors a better experience by integrating the best digital solutions for mobility.

Insights Back
Knowledge is our backbone

We believe in sharing our insights and expertise with you. Explore our resources and learn more about our products, services and industry trends.

Icons_Navigation_Case Studies

Case Studies

Step into the world of our delighted customers and see how we helped them achieve their goals.

Icons_Navigation_News Items

Corporate News

Stay in the loop with our company news, announcements, awards and events.

Icons_Navigation_Blogs

Blogs

Read our latest articles on topics ranging from technology, innovation, business and beyond.

Icons_Navigation_Webinars

Webinars

Be part of the action with our live or on-demand webinars, where our experts share invaluable knowledge.

Icons_Navigation_Ebooks

E-books & Whitepapers

Download our guides and reports on various aspects of technology and business.

Icons_Navigation_Events

Events

Find out where we are going to be next, and register for our upcoming events.

CTG Academy

Academy

Enhance your skills with our expert-led training courses, tutorials, and certifications at our Academy.

Join our Academy
About us Back
shaping digital together

We work shoulder to shoulder with our clients to ensure technology drives impact when and where it matters most.

Start the journey with us
Icons_Navigation_Why Cegeka

Why Cegeka

Discover why more than 2,500 clients around the world choose to work with us, and stay with us.

Icons_Navigation_Cegeka&Society

ESG at Cegeka

We turn ESG ambition into action via sustainable IT, carbon footprint reduction and an inclusive work environment.

Icons_Navigation_Our Story

The Cegeka Story

In just over 30 years, Cegeka has grown from 30 people to a global company with 9,000 employees across 3 continents.

Icons_Navigation_Annual Report

Annual Report

See how our work makes a difference, explore the full annual report to learn more.

More Cegeka

Our Management

Corporate News

Contact & Locations

Back
Select language

Global   (EN)

Austria   (DE)

Belgium   (NL)

Belgium   (FR)

Denmark   (EN)

Germany   (DE)

Italy   (IT)

Romania   (EN)

Sweden   (EN)

The Netherlands   (NL)

United Kingdom   (EN)

United States   (EN)

Let’s get in touch
Cegeka_Logo Solutions
Solutions
Hybrid Cloud

Hybrid Cloud

Explore the added value of cloud adoption for your business.

Data solution

Data & AI

Discover our different data solutions to help you become a data-driven company.

RegulatoryCompliance_Visuals_Navigation (1)

Regulatory Compliance

Ensure GDPR & GxP compliance with our comprehensive solutions.

Cyber Security & Networking Solution

Cyber Security & Networking

With cyber resilience, your organisation becomes a bit more secure with each day.

Digital Workplace Solution

Digital Workplace

Hybrid workplaces that increases productivity and reduces costs.

Testing_Visuals_IconNavigation (1)

Quality Engineering

Ensuring seamless software, one Test at a time.

Cegeka Application Services

Cegeka Application Services

Building the applications to embed growth, innovation and agility.

Business Applications

Business Applications

Transform your business with Microsoft Dynamics ERP and CRM, integrated with Microsoft’s Power Platform.

5G_Citymesh

5G & Mobile Private Networks

Expertise and development experience to bring all the advantages of 5G.

Products and platform solutions

Products & Platforms

Software solutions that optimize business processes and drive success.

Services
Services
Website_Navigation_IT_Team_Extension_3

IT Team Extension

The best IT professionals to support your projects.

Outsourcing Services

Outsourcing & Managed Services

Outsourcing your IT helps you to focus on your strategy.

Website_Navigation_Consultancy

Consultancy

The right skills and attitude to support the IT projects at your office

Website_Navigation_Projects

Projects

Integrating the right digital solutions for your IT project

Industries
Industries

Our industry-tailored services are designed to address specific challenges and opportunities across different industries.

All industries
Website_Navigation_Agriculture

Agriculture

Cegeka has a deep understanding of the agri and food ecosystem and the opportunities it creates.

food-80-80

Food

Streamline operations, ensure traceability and maintain compliance.

Energy & Utilities

Energy & Utilities

The arrival of smart electricity grids will allow companies to take care of their own energy management

pharma-icon-80-80

Pharma & Life Sciences

Face the increasingly complex challenges in Pharma & life sciences with confidence.

Manufacturing

Manufacturing

Production chains are becoming intelligent networks with real-time track-and-trace systems.

Website_Navigation_Mobility

Mobility

Offer citizens, businesses and visitors a better experience by integrating the best digital solutions for mobility.

Insights
Knowledge is our backbone

We believe in sharing our insights and expertise with you. Explore our resources and learn more about our products, services and industry trends.

Icons_Navigation_Case Studies

Case Studies

Step into the world of our delighted customers and see how we helped them achieve their goals.

Icons_Navigation_News Items

Corporate News

Stay in the loop with our company news, announcements, awards and events.

Icons_Navigation_Blogs

Blogs

Read our latest articles on topics ranging from technology, innovation, business and beyond.

Icons_Navigation_Webinars

Webinars

Be part of the action with our live or on-demand webinars, where our experts share invaluable knowledge.

Icons_Navigation_Ebooks

E-books & Whitepapers

Download our guides and reports on various aspects of technology and business.

Icons_Navigation_Events

Events

Find out where we are going to be next, and register for our upcoming events.

CTG Academy

Academy

Enhance your skills with our expert-led training courses, tutorials, and certifications at our Academy.

Join our Academy
About us
shaping digital together

We work shoulder to shoulder with our clients to ensure technology drives impact when and where it matters most.

Start the journey with us
Icons_Navigation_Why Cegeka

Why Cegeka

Discover why more than 2,500 clients around the world choose to work with us, and stay with us.

Icons_Navigation_Cegeka&Society

ESG at Cegeka

We turn ESG ambition into action via sustainable IT, carbon footprint reduction and an inclusive work environment.

Icons_Navigation_Our Story

The Cegeka Story

In just over 30 years, Cegeka has grown from 30 people to a global company with 9,000 employees across 3 continents.

Icons_Navigation_Annual Report

Annual Report

See how our work makes a difference, explore the full annual report to learn more.

More Cegeka

Our Management

Corporate News

Contact & Locations

Global   Global EN Austria   Austria DE Belgium   Belgium NL Belgium   Belgium FR Denmark   Denmark EN Germany   Germany DE Italy   Italy IT Romania   Romania EN Sweden   Sweden EN The Netherlands   The Netherlands NL United Kingdom   United Kingdom EN United States   United States EN Careers Let’s get in touch
Home Discover our latest blogs Discover our latest blogs How Threat Intelligence Powers Data-Driven Security Decisions
Cyber security & Networking
4 minutes reading

How Threat Intelligence Powers Data-Driven Security Decisions

Threat intelligence involves the collection and analysis of data to gain insights into threat actors posing cybersecurity risks to your organization. There are two main ways to understand attackers: Indicators of Compromise (IoCs) and Tactics, Techniques, and Procedures (TTPs). Let’s take a closer look at both methods and how their actionable insights help you protect your systems.

Raphaël Lheureux

Raphaël Lheureux

September 30, 2025

Spotting the Clues: Indicators of Compromise (IoCs) 

When cybercriminals strike, they leave behind digital fingerprints. These traces, known as IoCs, can help you detect recurring threats, but not all clues hold up equally well in different situations.

Each cyberattack leaves behind evidence indicating that an attack has occurred. For a server breach, this might include the IP address from which the attack originated. For a phishing email, it could be the email address and domain of the phishing site. For malware files, this may involve their hash value. These are Indicators of Compromise (IOCs), that can be documented and used to detect the same type of attack in the future. 

IoCs are particularly effective for detecting phishing. This is because phishing emails referring to the same domain of the phishing site are sent to numerous email addresses. As soon as we know that this domain hosts a phishing site, we can detect this for future recipients. However, for advanced attacks, IoCs are not as beneficial. If cyber criminals attack a server of organization X from a particular virtual machine in the cloud, they’ll likely carry out the same attack on organization Y from a different virtual machine with another IP address. This makes the IP address from which the attack originated a less reliable IoC as it doesn’t generalize well to other cases. While it can help detect attacks from the same IP address instantly, this indicator is generally more volatile and not valid for long. 

Going Deeper: Tactics, Techniques, and Procedures (TTPs) 

Instead of focusing on one-off clues, TTPs reveal the “how” behind an attack. By studying adversary behaviors, you can spot patterns that remain relevant long after an IP address or domain changes. 

Another approach is to examine the behavior, actions, or processes used by threat actors. So, if a server is compromised, instead of focusing on the IP address of the origin, you would assess the mechanism used to deliver the malware. For example, if malware is downloaded and installed on a workstation, you could do this by using a legitimate tool on the workstation (a LOLBin or Living Off The Land Binary), such as Curl or Certutil, by connecting to an IP address hosting the malware. The attackers might change the IP address, but using Curl to download a file from an IP address instead of using a fully qualified domain name could indicate attacker tools are being pulled onto the system. 

These Tactics, Techniques, and Procedures (TTPs) are a more reliable way to detect attacks because they generalize well. Of course, some will only be relevant for a limited time. For instance, a year ago, cyberattackers concealed malware in OneNote documents emailed to their victims. When this method gained popularity, Microsoft updated OneNote to prevent it from starting other processes. This TTP then became irrelevant. However, downloading malware from LOLBins will always remain a relevant TTP: programs with built-in download mechanisms will always exist, as a lot of legitimate functionality, such as update mechanisms, relies on this capability. TTPs are generally less volatile than IoCs. 

How Our Modern SOC Turns Threat Intelligence into Action 

Threat intelligence is only useful if it’s applied effectively. At Cegeka’s Modern SOC, we translate IoCs and TTPs into operational, tactical, and strategic insights to help our clients stay resilient.

For threat intelligence, Cegeka’s Modern SOC operates on three levels: operational, tactical, and strategic. 

On the operational level, we promptly detect threats by correlating known IoCs with data from our SIEM (Security Information and Event Management) platforms. We identify IP addresses, URLs, domains, and file hashes previously observed in attacks. We also use these IoCs to enrich security incident data. We rely on a curated threat intelligence source from an industry-leading partner assigning a risk score to each IoC hence providing a good balance between detection rate and false positives. 

On the tactical level, we perform threat hunting based on relevant TTPs extracted from our threat intelligence sources. Our senior CSIRT analysts regularly review our security logs, manually examining all occurrences of a specific TTP. They filter out any instance that seems legitimate, until they identify something that deviates from the normal behavior, potentially leading to the detection of an attack. Our threat intelligence sources also support detection engineering: determining exactly what we should detect (and prevent) to maximize threat coverage efficiently. 

On the strategic level, we write threat intelligence reports with a comprehensive analysis of incidents, attacks, and emerging trends or techniques. We do this at the request of the client or on our own initiative. The purpose of these reports is to monitor trends in the global threat landscape to inform our strategic decisions, investments, and engineering efforts. This is how we noticed attackers increasingly bypassing EDR (Endpoint Detection & Response) tools a few years ago. After analyzing this trend, we opted to invest in complementary NDR (Network Detection & Response) tools, while still realizing the importance of EDR. We also use threat intelligence for threat modeling: analyzing our client’s risk profile, identifying the relevant threat actors for the client, evaluating gaps in their defenses, and then providing quantitative advice on effectively addressing these gaps. Therefore, on a strategic level, threat intelligence enables us to make informed decisions and offer sound advice to our clients. 

From Insights to Strategy: Making Smarter Security Decisions 

When you understand both the clues attackers leave behind and the methods they rely on, you can strengthen your defenses more effectively. That’s the true value of threat intelligence: turning data into clear, actionable security decisions. 

Threat intelligence is vital for gaining insights into your attackers. Understanding what your attackers use (IoCs) and how they implement it (TTPs) allows you to respond quickly and protect your systems from those attacks that have previously succeeded with others.

Raphaël Lheureux

Raphaël Lheureux

More of Raphaël Lheureux articles

Get in touch