threat intelligence threatconnect cybersecurity threats threat security security orchestration threat intel cyber cyber squared security orchestration and automation platform security orchestration and analytics platform automation platform security orchestration and automation security automation orchestration playbooks intelligence analytics data big data automation information security indicators deprecation roi analyst threatconnect platform return on investment episode4 visualizing threat intel platform usage episodeiv organizational problems security industry defrag processes technology fragmentation malicious url automated malware analysis lab bro network security monitor tool chain malware analysis lab pcap open source malware analysis tools open source malware bronetwork open source malware analysis network capture memory image thug network traffic capture cuckoo sandbox files open source software low-interaction honeyclient open source tools urls threat intelligence processes threat intelligence investment threat intelligence investments diamond model operationalizing threat intelligence threat actors develop threat intelligence persistent threats splunk chinese statee-sponsored threats identify potential adversaries security operations leverage threat intelligence operational threat intelligence 2016 election dccc breach guccifer cozybear fancybear uselection thedncbreach dccc dnchack russianapts guccifer2.0 passivedns dnc dcleaks malformity labs maltego adversary andy pendergast diamondmodel
See more