© The Author(s), under exclusive license to APress Media, LLC, part of Springer Nature 2021
M. CopelandCloud Defense Strategies with Azure Sentinel https://doi.org/10.1007/978-1-4842-7132-2_5

5. Threat Intelligence

Marshall Copeland1  
(1)
New Braunfels, TX, USA
 

This chapter provides needed insight to understand the value of evidence-based information and knowledge about emerging cybersecurity through relational data called threat intelligence (TI). You begin by being introduced from the level of a SOC Manager or Director role. Then quickly going deeper than definitions, you leverage current historical cyber-criminal tactics, techniques, and procedures. The examples in this chapter help guide you to understand TI. You must decide the best way to leverage ...

Get Cloud Defense Strategies with Azure Sentinel: Hands-on Threat Hunting in Cloud Logs and Services now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.