As cyber threat intelligence grows as a field, assisting everyone from SOC analysts to C-suite executives, threat intel teams can benefit from process documentation and best practices. These concepts help build much-needed common tradecraft as well as language and procedures.
Read full article on Dark Reading