The threat intelligence handbook
This book will explain how you can begin the process of democratizing threat intelligence and put it into the hands of the people in your organization who can use it effectively. We look at the specific threat intelligence needs of six security teams, the sources of that intelligence, and exactly how the teams can use