{"id":8712,"date":"2023-06-19T15:19:21","date_gmt":"2023-06-19T15:19:21","guid":{"rendered":"https:\/\/www.abrahamsconsulting.com\/blog\/?p=8712"},"modified":"2023-06-19T15:19:21","modified_gmt":"2023-06-19T15:19:21","slug":"security-is-only-as-good-as-your-threat-intelligence","status":"publish","type":"post","link":"https:\/\/www.abrahamsconsulting.com\/blog\/security-is-only-as-good-as-your-threat-intelligence\/","title":{"rendered":"Security is only as good as your threat intelligence"},"content":{"rendered":"<p>In today&#8217;s digital landscape, protecting your business from cyber threats is paramount. Our latest blog post delves into the crucial role of threat intelligence in safeguarding your organization. Gain valuable insights into the importance of proactive threat protection, how advanced tools enhance security and why you need a robust threat intelligence strategy. Reading this blog post is one step towards staying ahead of cyberthreats. Read the blog and take the lead.<\/p>\n<p><a href=\"https:\/\/stuf.in\/bblyst\" target=\"_blank\" rel=\"noopener\">Read More&#8230;<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>\ud83d\udd12 Where&#8217;s the link between security and threat intelligence? Get answers from the Microsoft Security blog, &#8220;Security is Only as Good as Your Threat Intelligence.&#8221; Read it here for insight on proactive threat detection, security tools and threat intelligence strategy. <\/p>\n<p>@Microsoft Security<\/p>\n","protected":false},"author":2,"featured_media":8711,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1136],"tags":[],"class_list":["post-8712","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-technology"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.2 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Security is only as good as your threat intelligence - TechTonic Times<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.abrahamsconsulting.com\/blog\/security-is-only-as-good-as-your-threat-intelligence\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Security is only as good as your threat intelligence - TechTonic Times\" \/>\n<meta property=\"og:description\" content=\"\ud83d\udd12 Where&#039;s the link between security and threat intelligence? Get answers from the Microsoft Security blog, &quot;Security is Only as Good as Your Threat Intelligence.&quot; Read it here for insight on proactive threat detection, security tools and threat intelligence strategy.   @Microsoft Security\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.abrahamsconsulting.com\/blog\/security-is-only-as-good-as-your-threat-intelligence\/\" \/>\n<meta property=\"og:site_name\" content=\"TechTonic Times\" \/>\n<meta property=\"article:published_time\" content=\"2023-06-19T15:19:21+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.abrahamsconsulting.com\/blog\/wp-content\/uploads\/2023\/06\/Lambert_750x468_1.png\" \/>\n\t<meta property=\"og:image:width\" content=\"750\" \/>\n\t<meta property=\"og:image:height\" content=\"468\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Angela Gibson\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Angela Gibson\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.abrahamsconsulting.com\/blog\/security-is-only-as-good-as-your-threat-intelligence\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.abrahamsconsulting.com\/blog\/security-is-only-as-good-as-your-threat-intelligence\/\"},\"author\":{\"name\":\"Angela Gibson\",\"@id\":\"https:\/\/www.abrahamsconsulting.com\/blog\/#\/schema\/person\/2af41230f21d0cfc614be7ffd1cbcdad\"},\"headline\":\"Security is only as good as your threat intelligence\",\"datePublished\":\"2023-06-19T15:19:21+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.abrahamsconsulting.com\/blog\/security-is-only-as-good-as-your-threat-intelligence\/\"},\"wordCount\":83,\"image\":{\"@id\":\"https:\/\/www.abrahamsconsulting.com\/blog\/security-is-only-as-good-as-your-threat-intelligence\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.abrahamsconsulting.com\/blog\/wp-content\/uploads\/2023\/06\/Lambert_750x468_1.png\",\"articleSection\":[\"Technology\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.abrahamsconsulting.com\/blog\/security-is-only-as-good-as-your-threat-intelligence\/\",\"url\":\"https:\/\/www.abrahamsconsulting.com\/blog\/security-is-only-as-good-as-your-threat-intelligence\/\",\"name\":\"Security is only as good as your threat intelligence - TechTonic Times\",\"isPartOf\":{\"@id\":\"https:\/\/www.abrahamsconsulting.com\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.abrahamsconsulting.com\/blog\/security-is-only-as-good-as-your-threat-intelligence\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.abrahamsconsulting.com\/blog\/security-is-only-as-good-as-your-threat-intelligence\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.abrahamsconsulting.com\/blog\/wp-content\/uploads\/2023\/06\/Lambert_750x468_1.png\",\"datePublished\":\"2023-06-19T15:19:21+00:00\",\"author\":{\"@id\":\"https:\/\/www.abrahamsconsulting.com\/blog\/#\/schema\/person\/2af41230f21d0cfc614be7ffd1cbcdad\"},\"breadcrumb\":{\"@id\":\"https:\/\/www.abrahamsconsulting.com\/blog\/security-is-only-as-good-as-your-threat-intelligence\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.abrahamsconsulting.com\/blog\/security-is-only-as-good-as-your-threat-intelligence\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.abrahamsconsulting.com\/blog\/security-is-only-as-good-as-your-threat-intelligence\/#primaryimage\",\"url\":\"https:\/\/www.abrahamsconsulting.com\/blog\/wp-content\/uploads\/2023\/06\/Lambert_750x468_1.png\",\"contentUrl\":\"https:\/\/www.abrahamsconsulting.com\/blog\/wp-content\/uploads\/2023\/06\/Lambert_750x468_1.png\",\"width\":750,\"height\":468},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.abrahamsconsulting.com\/blog\/security-is-only-as-good-as-your-threat-intelligence\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.abrahamsconsulting.com\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Security is only as good as your threat intelligence\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.abrahamsconsulting.com\/blog\/#website\",\"url\":\"https:\/\/www.abrahamsconsulting.com\/blog\/\",\"name\":\"TechTonic Times\",\"description\":\"Security I Networking I Storage I IT Staffing I Managed Services\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.abrahamsconsulting.com\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.abrahamsconsulting.com\/blog\/#\/schema\/person\/2af41230f21d0cfc614be7ffd1cbcdad\",\"name\":\"Angela Gibson\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/secure.gravatar.com\/avatar\/c54bf3cfef1d2416a64501386c44cf093ab7044f0c0830ffd697ffb5d92636a2?s=96&d=mm&r=g\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/c54bf3cfef1d2416a64501386c44cf093ab7044f0c0830ffd697ffb5d92636a2?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/c54bf3cfef1d2416a64501386c44cf093ab7044f0c0830ffd697ffb5d92636a2?s=96&d=mm&r=g\",\"caption\":\"Angela Gibson\"},\"url\":\"https:\/\/www.abrahamsconsulting.com\/blog\/author\/admin\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Security is only as good as your threat intelligence - TechTonic Times","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.abrahamsconsulting.com\/blog\/security-is-only-as-good-as-your-threat-intelligence\/","og_locale":"en_US","og_type":"article","og_title":"Security is only as good as your threat intelligence - TechTonic Times","og_description":"\ud83d\udd12 Where's the link between security and threat intelligence? Get answers from the Microsoft Security blog, \"Security is Only as Good as Your Threat Intelligence.\" Read it here for insight on proactive threat detection, security tools and threat intelligence strategy.   @Microsoft Security","og_url":"https:\/\/www.abrahamsconsulting.com\/blog\/security-is-only-as-good-as-your-threat-intelligence\/","og_site_name":"TechTonic Times","article_published_time":"2023-06-19T15:19:21+00:00","og_image":[{"width":750,"height":468,"url":"https:\/\/www.abrahamsconsulting.com\/blog\/wp-content\/uploads\/2023\/06\/Lambert_750x468_1.png","type":"image\/png"}],"author":"Angela Gibson","twitter_misc":{"Written by":"Angela Gibson"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.abrahamsconsulting.com\/blog\/security-is-only-as-good-as-your-threat-intelligence\/#article","isPartOf":{"@id":"https:\/\/www.abrahamsconsulting.com\/blog\/security-is-only-as-good-as-your-threat-intelligence\/"},"author":{"name":"Angela Gibson","@id":"https:\/\/www.abrahamsconsulting.com\/blog\/#\/schema\/person\/2af41230f21d0cfc614be7ffd1cbcdad"},"headline":"Security is only as good as your threat intelligence","datePublished":"2023-06-19T15:19:21+00:00","mainEntityOfPage":{"@id":"https:\/\/www.abrahamsconsulting.com\/blog\/security-is-only-as-good-as-your-threat-intelligence\/"},"wordCount":83,"image":{"@id":"https:\/\/www.abrahamsconsulting.com\/blog\/security-is-only-as-good-as-your-threat-intelligence\/#primaryimage"},"thumbnailUrl":"https:\/\/www.abrahamsconsulting.com\/blog\/wp-content\/uploads\/2023\/06\/Lambert_750x468_1.png","articleSection":["Technology"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.abrahamsconsulting.com\/blog\/security-is-only-as-good-as-your-threat-intelligence\/","url":"https:\/\/www.abrahamsconsulting.com\/blog\/security-is-only-as-good-as-your-threat-intelligence\/","name":"Security is only as good as your threat intelligence - TechTonic Times","isPartOf":{"@id":"https:\/\/www.abrahamsconsulting.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.abrahamsconsulting.com\/blog\/security-is-only-as-good-as-your-threat-intelligence\/#primaryimage"},"image":{"@id":"https:\/\/www.abrahamsconsulting.com\/blog\/security-is-only-as-good-as-your-threat-intelligence\/#primaryimage"},"thumbnailUrl":"https:\/\/www.abrahamsconsulting.com\/blog\/wp-content\/uploads\/2023\/06\/Lambert_750x468_1.png","datePublished":"2023-06-19T15:19:21+00:00","author":{"@id":"https:\/\/www.abrahamsconsulting.com\/blog\/#\/schema\/person\/2af41230f21d0cfc614be7ffd1cbcdad"},"breadcrumb":{"@id":"https:\/\/www.abrahamsconsulting.com\/blog\/security-is-only-as-good-as-your-threat-intelligence\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.abrahamsconsulting.com\/blog\/security-is-only-as-good-as-your-threat-intelligence\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.abrahamsconsulting.com\/blog\/security-is-only-as-good-as-your-threat-intelligence\/#primaryimage","url":"https:\/\/www.abrahamsconsulting.com\/blog\/wp-content\/uploads\/2023\/06\/Lambert_750x468_1.png","contentUrl":"https:\/\/www.abrahamsconsulting.com\/blog\/wp-content\/uploads\/2023\/06\/Lambert_750x468_1.png","width":750,"height":468},{"@type":"BreadcrumbList","@id":"https:\/\/www.abrahamsconsulting.com\/blog\/security-is-only-as-good-as-your-threat-intelligence\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.abrahamsconsulting.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Security is only as good as your threat intelligence"}]},{"@type":"WebSite","@id":"https:\/\/www.abrahamsconsulting.com\/blog\/#website","url":"https:\/\/www.abrahamsconsulting.com\/blog\/","name":"TechTonic Times","description":"Security I Networking I Storage I IT Staffing I Managed Services","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.abrahamsconsulting.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/www.abrahamsconsulting.com\/blog\/#\/schema\/person\/2af41230f21d0cfc614be7ffd1cbcdad","name":"Angela Gibson","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/c54bf3cfef1d2416a64501386c44cf093ab7044f0c0830ffd697ffb5d92636a2?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/c54bf3cfef1d2416a64501386c44cf093ab7044f0c0830ffd697ffb5d92636a2?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/c54bf3cfef1d2416a64501386c44cf093ab7044f0c0830ffd697ffb5d92636a2?s=96&d=mm&r=g","caption":"Angela Gibson"},"url":"https:\/\/www.abrahamsconsulting.com\/blog\/author\/admin\/"}]}},"_links":{"self":[{"href":"https:\/\/www.abrahamsconsulting.com\/blog\/wp-json\/wp\/v2\/posts\/8712","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.abrahamsconsulting.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.abrahamsconsulting.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.abrahamsconsulting.com\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.abrahamsconsulting.com\/blog\/wp-json\/wp\/v2\/comments?post=8712"}],"version-history":[{"count":1,"href":"https:\/\/www.abrahamsconsulting.com\/blog\/wp-json\/wp\/v2\/posts\/8712\/revisions"}],"predecessor-version":[{"id":8713,"href":"https:\/\/www.abrahamsconsulting.com\/blog\/wp-json\/wp\/v2\/posts\/8712\/revisions\/8713"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.abrahamsconsulting.com\/blog\/wp-json\/wp\/v2\/media\/8711"}],"wp:attachment":[{"href":"https:\/\/www.abrahamsconsulting.com\/blog\/wp-json\/wp\/v2\/media?parent=8712"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.abrahamsconsulting.com\/blog\/wp-json\/wp\/v2\/categories?post=8712"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.abrahamsconsulting.com\/blog\/wp-json\/wp\/v2\/tags?post=8712"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}