Information you gather about threats or menaces to your computer systems and networks that allows you to prevent or neutralize the cyberattack is called threat intelligence. It also includes knowledge about the weaknesses in your computer’s security systems that you need to address in order to protect your computing resources. A report listing the IP addresses of potential threats is an example of threat intelligence.

Let’s say you’ve been experiencing constant break-ins at your home. You decide to investigate the incidents and discover that one of the ground floor windows has a defective lock. So you have the lock replaced and the break-ins cease. The intelligence you gathered helped you pin-point the exact problem and implement the precise solution.

People also search for…