Technical requirements
Since going into further depth on threat intelligence is beyond the scope of this book, we won’t go heavily into the topic except as it relates to detection engineering. We encourage you to read more into the topic from dedicated threat intelligence learning resources if you want to gain a deeper understanding. We’ve provided some additional resources at the end of this chapter.