June 2022
Beginner
460 pages
11h 5m
English
Collecting data and intelligence is vastly different than analyzing it. While many organizations don't leverage collection in a formalized way, many organizations do perform analysis on cyber threat intelligence and data in some capacity. Data without context is just that – data. However, with proper context and analysis applied, that data can then become intelligence.
In Chapter 1, Why You Need a Threat Program, we explained that the third stage of the intelligence life cycle is analysis. One of the most important phases, the analysis phase, involves exploiting data that is received as part of the collection phase to perform analysis or enrichment on that data, ultimately refining it and establishing ...
Read now
Unlock full access