From my Gartner Blog - What’s Like to Use Non-MRTI Threat Intelligence
blog.securitybalance.com
We often hear clients asking about threat intelligence related processes: how to collect, refine and utilize it (by the way, this document is being updated; let us know if you have feedback about it!). It’s very easy to explain and visualize when we are talking about machine readable TI (MRTI for short); your tools ingest the data feed and look for the IOCs in your environment. But what about the other type of threat intelligence, the “Non-MRTI” type?
From my Gartner Blog - What’s Like to Use Non-MRTI Threat Intelligence
From my Gartner Blog - What’s Like to Use…
From my Gartner Blog - What’s Like to Use Non-MRTI Threat Intelligence
We often hear clients asking about threat intelligence related processes: how to collect, refine and utilize it (by the way, this document is being updated; let us know if you have feedback about it!). It’s very easy to explain and visualize when we are talking about machine readable TI (MRTI for short); your tools ingest the data feed and look for the IOCs in your environment. But what about the other type of threat intelligence, the “Non-MRTI” type?