Threat Intelligence (TI)
A key strategy and process must be in place to automate the use of threat intelligence and this capability
must be available to all SOC, incident response (IR) and threat hunting team members. “In this regard, the
first result is that only 46% of respondents integrate their threat intelligence within their defense and
response systems.
Download Now