Resources

Access the latest resources including White Papers, Case Studies, Product Descriptions, Analysts Reports, and more, covering the topic of Cyber Threat Intelligence. Experts share their insights for Threat Analysts, Security Analysts, Managers of Threat Intelligence / SOC / CERT, and CISOs.

White paper

A Stakeholder-Centric Approach to Building a Cyber Threat Intelligence (CTI) practice English

How to make threat intelligence relevant to executives, business stakeholders, security operations and incident responders.

Download White Paper

White paper

Applying the Threat Intelligence Maturity Model to your organization English

This paper provides a framework to assess the maturity of threat intelligence efforts and guide future investments.

Download White Paper

White paper

Оценка уровня зрелости Вашей организации в области анализа разведданных о киберугрозах Russian

This paper provides a framework to assess the maturity of threat intelligence efforts and guide future investments.

Download White Paper

White paper

Accelerate Incident Response with Threat Intelligence English

This paper explains how Threat Intelligence improves Incident Response (IR) and how to introduce Threat Intelligence into your IR practice - with two use cases from Fox-IT.

Download White Paper

White paper

Повышение скорости реагирования на инциденты с помощью использо- вания разведданных о киберугрозах Russian

This paper explains how Threat Intelligence improves Incident Response (IR) and how to introduce Threat Intelligence into your IR practice - with two use cases from Fox-IT.

Download White Paper

White paper

Augment your SOC with human-led threat intelligence English

Learn about the limitations of automation in the Security Operations Center. Find out why SOCs should let humans take the lead in handling intelligence. Discover how to achieve the benefits of an integrated, intelligence-led cyber defense capability powered by a Threat Intelligence Platform.

Download White Paper

White paper

STIX 2.0 - Build your own intelligence English

This White Paper introduces STIX 2.0, compares it with the existing STIX 1.2 architecture and shows the future for STIX 2.x.

Download White Paper

White paper

EclecticIQ White Paper - Using a Robust Platform for Training Purposes English

Cyber threat analysts are hard to find, and are being heavily recruited by enterprises and governments. The problem is that threat intelligence has a steep learning curve, even for IT professionals in related fields. That’s why Cyber Threat Intelligence Network (CTIN) advocates a new approach to training cyber threat analysts: Use a Threat Intelligence Platform (TIP) as a hands-on instructional tool.

Download white paper