This document discusses threat intelligence, defining it as information about threats that can be used for action. It categorizes threat intelligence as either tactical (specific indicators like IP addresses and files) or strategic (trends and lessons from past incidents). For intelligence to be effective, it should be timely, accurate, actionable, and relevant. Traditional methods of obtaining intelligence include security vendor alerts, government reports, and automated feeds. Many security products now incorporate threat intelligence. The document stresses the importance of intelligence being actionable so security teams can respond quickly with minimal validation or manual work based on their specific context. It also cautions that intelligence integration requires a staged process and not all intelligence will be relevant to every organization.