This chapter provides needed insight to understand the value of evidence-based information and knowledge about emerging cybersecurity through relational data called threat intelligence (TI). You begin by being introduced from the level of a SOC Manager or Director role. Then quickly going deeper than definitions, you leverage current historical cyber-criminal tactics, techniques, and procedures. The examples in this chapter help guide you to understand TI. You must decide the best way to leverage ...
5. Threat Intelligence
Get Cloud Defense Strategies with Azure Sentinel: Hands-on Threat Hunting in Cloud Logs and Services now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.