Threat intelligence
We're assuming a couple of things about the audience of our book. You either want to move into threat intelligence and security research as a discipline, or you have the need at your organization to operationalize threat intelligence for varying reasons. For organizations that do not have mature threat intelligence programs, it's not unheard of to supplement your threat intelligence repositories with trusted threat intelligence from third parties. This could assist in fulfilling any knowledge gaps your organization has while you do not have the collection and analysis capabilities to address these issues.
Here, we won't take a deep dive because we have already spoken about the various places where a threat intelligence team could consume Open Source Intelligence (OSINT) for free. Now, let's move on to discuss how product and service-focused organizations can consume threat intelligence.