Cyber Security Terms
Threat Intelligence

What is Threat Intelligence?

Threat intelligence is information gathered by information security teams that is used to identify an organization’s cyber threats and mitigate the impact of any cyber attacks.

Ongoing challenges across the cybersecurity landscape, like costly data breaches and increasing advanced persistent threats (APTs), are highlighting the importance of threat intelligence.

The Threat Intelligence Life Cycle

The threat intelligence life cycle helps security teams find meaningful information from raw data to guide their strategic decision-making.

It involves the following steps:

1. Planning and direction
2. Data collection
3. Analysis
4. Production
5. Dissemination

Types of Threat Intelligence

The type of threat intelligence required depends on: the intended audience, the source of the intelligence, and an organization's requirements.

Threat intelligence can be categorized into three different types:

1. Strategic threat intelligence
2. Tactical threat intelligence
3. Operational threat intelligence

Key takeaways

  • Check icon
    Threat intelligence allows organizations to prevent potential cyber attacks.
  • Check icon
    Security teams use the threat intelligence lifecycle to extract actionable insights from raw data.
  • Check icon
    The different types of threat intelligence serve varying operational and security needs.
  • Check icon
  • Check icon
Reviewed by
No items found.

Read more about Threat Intelligence

Learn more about Threat Intelligence and the latest issues in cybersecurity.
UpGuard customer support teamUpGuard customer support teamUpGuard customer support team

See UpGuard In Action

Book a free, personalized onboarding call with one of our cybersecurity experts.
Abstract shapeAbstract shape

More from our blog

Learn more about the latest issues in cybersecurity.
Deliver icon

Sign up to our newsletter

Get the latest curated cybersecurity news, breaches, events and updates in your inbox every week.
Abstract shapeAbstract shape
Free instant security score

How secure is your organization?

Request a free cybersecurity report to discover key risks on your website, email, network, and brand.
  • Check icon
    Instant insights you can act on immediately
  • Check icon
    Hundreds of risk factors including email security, SSL, DNS health, open ports and common vulnerabilities
Website Security scan resultsWebsite Security scan ratingAbstract shape