Access the latest resources including White Papers, Case Studies, Product Descriptions, Analysts Reports, and more, covering the topic of Cyber Threat Intelligence. Experts share their insights for Threat Analysts, Security Analysts, Managers of Threat Intelligence / SOC / CERT, and CISOs.
Indicators of Compromise (IOCs) have their place in cybersecurity, but as cyber threats evolve, they have become ineffective in threat detection. In order to detect the techniques, tactics and procedures (TTPs) of adversaries as well as to fully understand and anticipate threats, we have to go Beyond the IOC with structured intelligence.Download White Paper
This White Paper introduces STIX 2.1, compares it with the existing STIX 1.2 architecture and shows the future for STIX 2.x.Download White Paper
How to make threat intelligence relevant to executives, business stakeholders, security operations and incident responders.Download White Paper
This paper provides a framework to assess the maturity of threat intelligence efforts and guide future investments.Download White Paper
Learn about the limitations of automation in the Security Operations Center. Find out why SOCs should let humans take the lead in handling intelligence. Discover how to achieve the benefits of an integrated, intelligence-led cyber defense capability powered by a Threat Intelligence Platform.Download White Paper
This paper explains how Threat Intelligence improves Incident Response (IR) and how to introduce Threat Intelligence into your IR practice - with two use cases from Fox-IT.Download White Paper
Cyber threat analysts are hard to find, and are being heavily recruited by enterprises and governments. The problem is that threat intelligence has a steep learning curve, even for IT professionals in related fields. That’s why Cyber Threat Intelligence Network (CTIN) advocates a new approach to training cyber threat analysts: Use a Threat Intelligence Platform (TIP) as a hands-on instructional tool.Download White Paper