https://feedly.com/ti-essentials/posts/making-proactive-threat-intelligence-sustainable-in-a-post-covid-world
Mar 11, 2022 - COVID-19 put cybercrime into overdrive. Now more than ever, a reactive cybersecurity strategy is inadequate and organisations need a proactive approach.
threat intelligencemakingproactivesustainablepost
https://feedly.com/customers/posts/gematik-threat-intelligence
Jan 16, 2025 - Discover how gematik’s CTI team transformed threat intel workflows, automating OSINT tasks and enhancing daily briefings with Feedly.
case studythreat intelligenceautomatingfeedly
https://feedly.com/threat-intelligence/use-cases/track-critical-vulnerabilities
Feedly Threat Intelligence scours the open web to find, research and prioritize critical vulnerabilities that matter to you up to 3 days sooner.
feedly threat intelligencetrackcriticalvulnerabilities
https://feedly.com/ti-essentials/posts/how-to-objectively-compare-sources-for-threat-intelligence-reports
Mar 11, 2022 - Each of your reports should be labeled indicating how much you trust the information that you are providing. Here's a method for rating those sources.
threat intelligencecomparesourcesreportsti
https://feedly.com/threat-intelligence?utm_campaign=feedly_cves
Feedly Threat Intelligence is the leading solution to collect, analyze, and share actionable cyber threat intel like vulnerabilities, cyberattacks, threat...
feedly threat intelligencecollectanalyzeshareactionable
https://feedly.com/ti-essentials/posts/how-to-use-threat-intelligence-to-form-a-stronger-purple-team
Mar 11, 2022 - If you’re doing purple team exercises, threat intelligence is one way to help set up real-world scenarios for your team. This way, you can build real TTPs.
threat intelligenceuseformstrongerpurple
https://feedly.com/ti-essentials/posts/defining-osint-and-its-role-in-cyber-threat-intelligence
Mar 8, 2022 - Open Source Intelligence refers to all data publicly available for exploitation. It is widely used in threat intelligence to detect and counter cyber attacks.
cyber threat intelligencedefiningosintroleti
https://feedly.com/ti-essentials/posts/how-to-use-mitre-attck-for-threat-intelligence
Apr 12, 2022 - Using ATT&CK for CTI provides a way of analyzing adversarial capabilities and how threat actors accomplish their goals in the cyber domain.
threat intelligenceusemitreattamp