<s>
Threat	B-General_Concept
intelligence	I-General_Concept
is	O
the	O
"	O
cyclical	O
practice	O
"	O
of	O
planning	O
,	O
collecting	O
,	O
processing	O
,	O
analyzing	O
and	O
disseminating	O
information	O
that	O
poses	O
a	O
threat	O
to	O
applications	O
and	O
systems	O
.	O
</s>
<s>
Threat	B-General_Concept
intelligence	I-General_Concept
collects	O
information	O
in	O
real-time	O
to	O
showcase	O
the	O
threat	O
landscape	O
for	O
identifying	O
threats	O
to	O
a	O
computer	O
,	O
application	O
or	O
network	O
.	O
</s>
<s>
Threat	B-General_Concept
intelligence	I-General_Concept
is	O
not	O
to	O
be	O
confused	O
with	O
vulnerability	O
management	O
.	O
</s>
<s>
Platforms	O
exist	O
that	O
enable	O
the	O
automation	O
of	O
threat	B-General_Concept
intelligence	I-General_Concept
.	O
</s>
<s>
These	O
platforms	O
are	O
commonly	O
referred	O
to	O
as	O
"	O
TIPs	O
"	O
or	O
Threat	B-General_Concept
Intelligence	I-General_Concept
Platforms	O
.	O
</s>
<s>
A	O
threat	B-General_Concept
intelligence	I-General_Concept
platform	O
is	O
typically	O
used	O
by	O
Security	O
Operations	O
Center	O
Teams	O
(	O
SOC	O
)	O
for	O
day	O
to	O
day	O
threat	O
response	O
and	O
events	O
as	O
they	O
occur	O
.	O
</s>
<s>
Generalized	O
Threat	B-General_Concept
Intelligence	I-General_Concept
teams	O
use	O
the	O
platform	O
to	O
make	O
educated	O
predictions	O
based	O
on	O
actors	O
,	O
campaigns	O
,	O
industry	O
targets	O
as	O
well	O
as	O
platform	O
(	O
network	O
,	O
application	O
,	O
hardware	O
)	O
targets	O
.	O
</s>
<s>
provides	O
a	O
threat	B-General_Concept
intelligence	I-General_Concept
model	O
based	O
on	O
their	O
intelligence	O
platform	O
.	O
</s>
<s>
Some	O
have	O
defined	O
threat	B-General_Concept
intelligence	I-General_Concept
as	O
including	O
data	O
of	O
sensors	O
or	O
honeypots	O
deployed	O
across	O
the	O
internet	O
and	O
the	O
darkweb	O
,	O
these	O
traps	O
provide	O
advance	O
metrics	O
on	O
the	O
state	O
of	O
the	O
internet	O
and	O
intent	O
of	O
adversaries	O
.	O
</s>
<s>
Other	O
types	O
of	O
threat	B-General_Concept
intelligence	I-General_Concept
might	O
include	O
automated	O
darkweb	O
scanning	O
,	O
mass	O
internet	O
scanning	O
,	O
or	O
tactics	O
techniques	O
and	O
procedures	O
gathering	O
,	O
which	O
attempts	O
to	O
tie	O
together	O
adversary	O
strategies	O
in	O
order	O
to	O
increase	O
the	O
defender	O
's	O
understanding	O
and	O
provide	O
them	O
with	O
situational	O
awareness	O
.	O
</s>
