Threat Intelligence Essentials

Best Practices for CTI Pros

Articles written by and for threat intelligence professionals

Image
Best Practices

Validating “new” adversary tactics: Introducing the Tactical Decomposition Workflow

Image
Best Practices

Structured analysis for small CTI teams: Using AI to reinforce tradecraft

Image
Best Practices

New CTI prompting best practices and use cases

Image
Best Practices

Dark web monitoring: Common gaps and how to close them

Image
Best Practices

How to pitch CTI to leaders: A new approach to threat intel business cases

Image

CTI Prompt Library

Image
Best Practices

What CTI practitioners recommend you focus on in 2026

Image
Best Practices

2026 CTI Practitioners Roundup

Image
Best Practices

Practical CTI workflow improvements that save time

Image
Best Practices

Using visuals to communicate threat intelligence effectively

Image
Best Practices

After the analyst role: A career roadmap for CTI professionals

Image
Best Practices

How can you use Attack Surface Intelligence (ASI) to reduce your organizational risk profile

Image
Best Practices

How to operationalize the CTI-CMM: A practical guide

Image
Best Practices

From malicious packages to actionable intelligence with OpenSourceMalware

Image
Best Practices

CTI tradecraft: Investigating a mobile scareware campaign

Image
Threat Hunting

How to fuse CTI with threat hunting

Image
MITRE ATT&CK

Introduction to MITRE ATT&CK - Featuring Version 18 (2025)

Image
Best Practices

How to go from good to great intelligence leadership

Image
Best Practices

Stop reinventing the CTI wheel: Why cyber intelligence needs to get back to project management basics

Image

Lessons from the “Trick or breach” webinar

Image
Best Practices

Three core characteristics of high-quality Cyber Threat Intelligence

Image
Threat Hunting

How to tackle the most difficult step in Threat Modeling: Asset mapping

Image
Best Practices

Beyond queries: AI prompting techniques for CTI analysts

Image
Best Practices

Think smarter, not harder: Making SATs work in CTI

Contributors

Image
Guillaume Alliel
Founder, CEO Phinasoft
Image
Alessandro Magi
Threat Intelligence Advisor
Image
Shawn Jaques
Head of Product Marketing
Image
Marcelle Lee
Cybersecurity Consultant and Researcher
View All Contributors