<h2>The Evolution of Cyber Threat Intelligence (CTI)</h2>
<p>The use of cyber threat intelligence (CTI) as a resource for network defense is growing, with 72% of respondents’ organizations producing or consuming CTI, compared with 60% in 2017. While the use of CTI continues to grow, there is no one-size-fits-all approach. Organizations leverage different types of CTI to meet different needs. This survey focuses on how and why CTI is being used, how it is helping defenders, what data sources are being leveraged, and how data is converted into usable intelligence.</p>
<p>Key takeaways from this year's survey:</p>
<ul>
<li>More organizations are consuming CTI</li>
<li>More specific intelligence is better</li>
<li>Information-sharing programs have value beyond just the information that is being shared</li>
<li>More automation and machine learning capabilities would be useful</li>
</ul>
<p>CTI is used to determine where to focus security efforts, track adversary trends, detect adversary activity, and make networks more secure and resilient against threats.</p>
<h3>Get this year's report and find out how cyber threat intelligence is evolving.</h3>