Top 4 Use Cases for a Threat Intelligence Platform
Threat Intelligence (TI) can come from different sources—local or external feeds and includes attack signatures, registry data, IP addresses, domain names, and a host of other pieces of information often referred to as “artifacts” or “Indicators of Compromise.” TI also adds information about how adversaries operate and behave du...