Threat Intelligence Essentials

Best Practices for CTI Pros

Articles written by and for threat intelligence professionals

Image
Best Practices

CTI tradecraft: Investigating a mobile scareware campaign

Image
Threat Hunting

How to fuse CTI with threat hunting

Image
MITRE ATT&CK

Introduction to MITRE ATT&CK - Featuring Version 18 (2025)

Image
Best Practices

How to go from good to great intelligence leadership

Image
Best Practices

Stop reinventing the CTI wheel: Why cyber intelligence needs to get back to project management basics

Image

Lessons from the “Trick or breach” webinar

Image
Best Practices

Three core characteristics of high-quality Cyber Threat Intelligence

Image
Threat Hunting

How to tackle the most difficult step in Threat Modeling: Asset mapping

Image
Best Practices

Beyond queries: AI prompting techniques for CTI analysts

Image
Best Practices

Think smarter, not harder: Making SATs work in CTI

Image
Best Practices

Practical guidance for DORA compliance using Feedly

Image
Best Practices

Beyond third parties: CTI’s role in mitigating supply chain risk

Image
Best Practices

Top 5 tips for operationalizing CTI—insights from Feedly experts

Image
Best Practices

Conference Call for Proposals: Strategies that help me tackle CFPs

Image
Best Practices

Harnessing OSINT for threat intelligence collection

Image
Threat Hunting

Creating a threat model: Turning theory into practice

Image
Threat Hunting

Essential guide to developing an effective cyber threat model

Image
Best Practices

Monitoring geopolitical risk: strategies and resources for intelligence analysts

Image
Social Engineering

How artificial intelligence impacts the present and future of social engineering attacks

Image
Social Engineering

Avoiding Analysis Paralysis

Image
PIRs

Translate your PIRs into AI Feeds

Image
PIRs

Deep dive on Feedly’s PIR blueprint and how to operationalize it

Image
PIRs

How to conduct stakeholder interviews to set Priority Intelligence Requirements (PIRs)

Image
PIRs

How to use Priority Intelligence Requirements (PIRs) with Feedly

Image
Social Engineering

Frequent social engineering vishing attack scenarios

Image
Social Engineering

Social engineering kill–chain: Predicting, minimizing & disrupting attack verticals

Image
Social Engineering

High value targets: Where should you focus your intelligence collection & analysis efforts?

Image
MITRE ATT&CK

How to Use MITRE ATT&CK for Threat Intelligence

Image
Threat Intelligence

The future of cybersecurity doesn’t lie in technology

Image
Best Practices

Using OSINT to Observe the Next Attack on Your Network

Image
Best Practices

5 Critical Components to Include in Your Next Threat Intel Brief

Image
Best Practices

Everyday Risk Rating

Image
Best Practices

How to Objectively Compare Sources for Threat Intelligence Reports

Image
Best Practices

How to Use Threat Intelligence to Form a Stronger Purple Team

Image
Best Practices

Making Proactive Threat Intelligence Sustainable in a Post-COVID World

Image
Threat Intelligence

Defining OSINT and Its Role in Cyber Threat Intelligence

Contributors

Image
Guillaume Alliel
Founder, CEO Phinasoft
Image
Alessandro Magi
Threat Intelligence Advisor
Image
Shawn Jaques
Head of Product Marketing
Image
Marcelle Lee
Cybersecurity Consultant and Researcher
View All Contributors