Cyber Threat Intelligence:
Threat data, background knowledge and methodology
IKARUS threat.intelligence.platform
Cyber defence technologies collect information from endpoints and networks, programmes, files and logs. Cyber security analysts supplement these assessments, hashes and algorithms with background knowledge of attacker groups, forensic investigations, reconstructions of malicious infrastructures and indicators from security incidents, data breaches, zero-day exploits or attack attempts.
Cyber Threat Intelligence (CTI) links all this data and puts it into a larger, meaningful context. Only in this way can you filter out the information that is actually relevant from the flood of data, understand current incidents and use your knowledge in a targeted manner for your defense.