Accelerate Incident Response with Threat Intelligence
This paper explains how Threat Intelligence improves Incident Response (IR) and how to introduce Threat Intelligence into your IR practice - with two use cases from Fox-IT.
Download White PaperApplying the Threat Intelligence Maturity Model to your organization
This paper provides a framework to assess the maturity of threat intelligence efforts and guide future investments.
Download White PaperAugment your SOC with human-led threat intelligence
Learn about the limitations of automation in the Security Operations Center. Find out why SOCs should let humans take the lead in handling intelligence. Discover how to achieve the benefits of an integrated, intelligence-led cyber defense capability powered by a Threat Intelligence Platform.
Download White PaperBeyond the IOC with Cyber Threat Intelligence (CTI)
Focusing on tactics, techniques, and procedures (TTPs) to better protect your organization
Download White PaperBuilding a Threat Intelligence Practice
How to make threat intelligence relevant to executives, business stakeholders, security operations and incident responders.
Download White PaperEclecticIQ Retrospective: A Look at the Themes & Events That Shaped the 2022 Cyber Landscape
EclecticIQ’s Intelligence & Research Team looked back on the growth and changes that took place in cybersecurity in 2022, as well as a brief look ahead to 2023.
Download White PaperSTIX 2.1 and Beyond - The Essential Role of STIX in CTI Operations
This White Paper highlights the exciting capabilities of STIX 2.1 and provides clear guidance on mapping out the optimal role of STIX in your cyber threat intelligence operations (CTI-Ops) to better meet your stakeholders’ needs.
Download White PaperThe Tradecraft of a Successful Threat Investigation: A COVID-19 Case Study
What does it take to run a successful threat investigation with global implications? Since February 2020, we at EclecticIQ have tracked adversaries as they put their malicious tactics, techniques, and procedures (TTPs) into high gear to take advantage of organizations shifting focus from security to the COVID-19 health crisis.
Download White PaperThreat Data Ingestion: Get the Best of Both Worlds
Selecting a threat intelligence platform (TIP) is a complex decision that often puts the CTI and the IT Ops teams at odds with each other. The CTI team demands high-fidelity threat data. The IT Ops team requires a TIP with predictable and manageable scalability.
Download White PaperUsing a Robust Platform for Training Purposes
Cyber threat analysts are hard to find, and are being heavily recruited by enterprises and governments. The problem is that threat intelligence has a steep learning curve, even for IT professionals in related fields. That’s why Cyber Threat Intelligence Network (CTIN) advocates a new approach to training cyber threat analysts: Use a Threat Intelligence Platform (TIP) as a hands-on instructional tool.
Download White Paper