Summary
In this chapter, we discussed what threat intelligence is about, looking at how it can increase the effectiveness of your security monitoring activities and will be beneficial for your overall cybersecurity program. We concluded with an exercise that saw us add AlienVault's OTX threat data to the Security Onion setup, to illustrate how to go about implementing a simple form of threat intelligence.
This covers the tools setup and data gathering part of the book. In the next chapter, we are going to start using the data and look at ways to visualize, correlate, and alert on interesting findings.