The concept of ‘threat intelligence’ has different meanings to different audiences. It can refer to: Human-readable information to guide or inform threat researchers. Machine-readable raw data flowing into a system from device logs or telemetry. Unvetted and/or crowd-sourced lists. The results of analysis of one or more of the above forms to produce high-quality information. This whitepaper will discuss how to gauge the real value of threat intelligence, and how, when properly developed and applied, it can bring enterprise-grade security to businesses and individuals with limited budgets and personnel. |