{"id":4043,"date":"2024-03-18T14:22:26","date_gmt":"2024-03-18T19:22:26","guid":{"rendered":"https:\/\/us.etg-it.com\/2024\/03\/18\/security-is-only-as-good-as-your-threat-intelligence\/"},"modified":"2024-03-18T14:22:26","modified_gmt":"2024-03-18T19:22:26","slug":"security-is-only-as-good-as-your-threat-intelligence","status":"publish","type":"post","link":"https:\/\/us.etg-it.com\/2024\/03\/18\/security-is-only-as-good-as-your-threat-intelligence\/","title":{"rendered":"Security is only as good as your threat intelligence"},"content":{"rendered":"<p>In today&#8217;s digital landscape, protecting your business from cyber threats is paramount. Our latest blog post delves into the crucial role of threat intelligence in safeguarding your organization. Gain valuable insights into the importance of proactive threat protection, how advanced tools enhance security and why you need a robust threat intelligence strategy. Reading this blog post is one step towards staying ahead of cyberthreats. Read the blog and take the lead.<\/p>\n<p><a href=\"https:\/\/stuf.in\/bdkrot\" target=\"_blank\" rel=\"noopener\">Read More&#8230;<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>\ud83d\udd12 Where&#8217;s the link between security and threat intelligence? Get answers from the Microsoft Security blog, &#8220;Security is Only as Good as Your Threat Intelligence.&#8221; Read it here for insight on proactive threat detection, security tools and threat intelligence strategy. @Microsoft Security<\/p>\n","protected":false},"author":1,"featured_media":4042,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[32],"tags":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v21.6 (Yoast SEO v21.6) - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Security is only as good as your threat intelligence - ETG Consulting US<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/us.etg-it.com\/2024\/03\/18\/security-is-only-as-good-as-your-threat-intelligence\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Security is only as good as your threat intelligence\" \/>\n<meta property=\"og:description\" content=\"\ud83d\udd12 Where&#039;s the link between security and threat intelligence? Get answers from the Microsoft Security blog, &quot;Security is Only as Good as Your Threat Intelligence.&quot; Read it here for insight on proactive threat detection, security tools and threat intelligence strategy. @Microsoft Security\" \/>\n<meta property=\"og:url\" content=\"https:\/\/us.etg-it.com\/2024\/03\/18\/security-is-only-as-good-as-your-threat-intelligence\/\" \/>\n<meta property=\"og:site_name\" content=\"ETG Consulting US\" \/>\n<meta property=\"article:published_time\" content=\"2024-03-18T19:22:26+00:00\" \/>\n<meta name=\"author\" content=\"admin\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"admin\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/us.etg-it.com\/2024\/03\/18\/security-is-only-as-good-as-your-threat-intelligence\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/us.etg-it.com\/2024\/03\/18\/security-is-only-as-good-as-your-threat-intelligence\/\"},\"author\":{\"name\":\"admin\",\"@id\":\"https:\/\/us.etg-it.com\/#\/schema\/person\/3a7c6bd2cf24750d2a863b3915584485\"},\"headline\":\"Security is only as good as your threat intelligence\",\"datePublished\":\"2024-03-18T19:22:26+00:00\",\"dateModified\":\"2024-03-18T19:22:26+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/us.etg-it.com\/2024\/03\/18\/security-is-only-as-good-as-your-threat-intelligence\/\"},\"wordCount\":82,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/us.etg-it.com\/#organization\"},\"articleSection\":[\"Microsoft\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/us.etg-it.com\/2024\/03\/18\/security-is-only-as-good-as-your-threat-intelligence\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/us.etg-it.com\/2024\/03\/18\/security-is-only-as-good-as-your-threat-intelligence\/\",\"url\":\"https:\/\/us.etg-it.com\/2024\/03\/18\/security-is-only-as-good-as-your-threat-intelligence\/\",\"name\":\"Security is only as good as your threat intelligence - ETG Consulting US\",\"isPartOf\":{\"@id\":\"https:\/\/us.etg-it.com\/#website\"},\"datePublished\":\"2024-03-18T19:22:26+00:00\",\"dateModified\":\"2024-03-18T19:22:26+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/us.etg-it.com\/2024\/03\/18\/security-is-only-as-good-as-your-threat-intelligence\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/us.etg-it.com\/2024\/03\/18\/security-is-only-as-good-as-your-threat-intelligence\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/us.etg-it.com\/2024\/03\/18\/security-is-only-as-good-as-your-threat-intelligence\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/us.etg-it.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Security is only as good as your threat intelligence\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/us.etg-it.com\/#website\",\"url\":\"https:\/\/us.etg-it.com\/\",\"name\":\"ETG Consulting\",\"description\":\"Microsoft Dynamics 365\",\"publisher\":{\"@id\":\"https:\/\/us.etg-it.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/us.etg-it.com\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/us.etg-it.com\/#organization\",\"name\":\"ETG Consulting\",\"url\":\"https:\/\/us.etg-it.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/us.etg-it.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/us.etg-it.com\/wp-content\/uploads\/2018\/09\/etg-consulting-logos-e1536441993524.jpg\",\"contentUrl\":\"https:\/\/us.etg-it.com\/wp-content\/uploads\/2018\/09\/etg-consulting-logos-e1536441993524.jpg\",\"width\":250,\"height\":116,\"caption\":\"ETG Consulting\"},\"image\":{\"@id\":\"https:\/\/us.etg-it.com\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.linkedin.com\/company\/etg-consulting\/\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/us.etg-it.com\/#\/schema\/person\/3a7c6bd2cf24750d2a863b3915584485\",\"name\":\"admin\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/us.etg-it.com\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/d8982c516c8e0f2febac5a1b2ee03859?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/d8982c516c8e0f2febac5a1b2ee03859?s=96&d=mm&r=g\",\"caption\":\"admin\"}}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Security is only as good as your threat intelligence - ETG Consulting US","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/us.etg-it.com\/2024\/03\/18\/security-is-only-as-good-as-your-threat-intelligence\/","og_locale":"en_US","og_type":"article","og_title":"Security is only as good as your threat intelligence","og_description":"\ud83d\udd12 Where's the link between security and threat intelligence? Get answers from the Microsoft Security blog, \"Security is Only as Good as Your Threat Intelligence.\" Read it here for insight on proactive threat detection, security tools and threat intelligence strategy. @Microsoft Security","og_url":"https:\/\/us.etg-it.com\/2024\/03\/18\/security-is-only-as-good-as-your-threat-intelligence\/","og_site_name":"ETG Consulting US","article_published_time":"2024-03-18T19:22:26+00:00","author":"admin","twitter_card":"summary_large_image","twitter_misc":{"Written by":"admin"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/us.etg-it.com\/2024\/03\/18\/security-is-only-as-good-as-your-threat-intelligence\/#article","isPartOf":{"@id":"https:\/\/us.etg-it.com\/2024\/03\/18\/security-is-only-as-good-as-your-threat-intelligence\/"},"author":{"name":"admin","@id":"https:\/\/us.etg-it.com\/#\/schema\/person\/3a7c6bd2cf24750d2a863b3915584485"},"headline":"Security is only as good as your threat intelligence","datePublished":"2024-03-18T19:22:26+00:00","dateModified":"2024-03-18T19:22:26+00:00","mainEntityOfPage":{"@id":"https:\/\/us.etg-it.com\/2024\/03\/18\/security-is-only-as-good-as-your-threat-intelligence\/"},"wordCount":82,"commentCount":0,"publisher":{"@id":"https:\/\/us.etg-it.com\/#organization"},"articleSection":["Microsoft"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/us.etg-it.com\/2024\/03\/18\/security-is-only-as-good-as-your-threat-intelligence\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/us.etg-it.com\/2024\/03\/18\/security-is-only-as-good-as-your-threat-intelligence\/","url":"https:\/\/us.etg-it.com\/2024\/03\/18\/security-is-only-as-good-as-your-threat-intelligence\/","name":"Security is only as good as your threat intelligence - ETG Consulting US","isPartOf":{"@id":"https:\/\/us.etg-it.com\/#website"},"datePublished":"2024-03-18T19:22:26+00:00","dateModified":"2024-03-18T19:22:26+00:00","breadcrumb":{"@id":"https:\/\/us.etg-it.com\/2024\/03\/18\/security-is-only-as-good-as-your-threat-intelligence\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/us.etg-it.com\/2024\/03\/18\/security-is-only-as-good-as-your-threat-intelligence\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/us.etg-it.com\/2024\/03\/18\/security-is-only-as-good-as-your-threat-intelligence\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/us.etg-it.com\/"},{"@type":"ListItem","position":2,"name":"Security is only as good as your threat intelligence"}]},{"@type":"WebSite","@id":"https:\/\/us.etg-it.com\/#website","url":"https:\/\/us.etg-it.com\/","name":"ETG Consulting","description":"Microsoft Dynamics 365","publisher":{"@id":"https:\/\/us.etg-it.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/us.etg-it.com\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/us.etg-it.com\/#organization","name":"ETG Consulting","url":"https:\/\/us.etg-it.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/us.etg-it.com\/#\/schema\/logo\/image\/","url":"https:\/\/us.etg-it.com\/wp-content\/uploads\/2018\/09\/etg-consulting-logos-e1536441993524.jpg","contentUrl":"https:\/\/us.etg-it.com\/wp-content\/uploads\/2018\/09\/etg-consulting-logos-e1536441993524.jpg","width":250,"height":116,"caption":"ETG Consulting"},"image":{"@id":"https:\/\/us.etg-it.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.linkedin.com\/company\/etg-consulting\/"]},{"@type":"Person","@id":"https:\/\/us.etg-it.com\/#\/schema\/person\/3a7c6bd2cf24750d2a863b3915584485","name":"admin","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/us.etg-it.com\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/d8982c516c8e0f2febac5a1b2ee03859?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/d8982c516c8e0f2febac5a1b2ee03859?s=96&d=mm&r=g","caption":"admin"}}]}},"_links":{"self":[{"href":"https:\/\/us.etg-it.com\/wp-json\/wp\/v2\/posts\/4043"}],"collection":[{"href":"https:\/\/us.etg-it.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/us.etg-it.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/us.etg-it.com\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/us.etg-it.com\/wp-json\/wp\/v2\/comments?post=4043"}],"version-history":[{"count":0,"href":"https:\/\/us.etg-it.com\/wp-json\/wp\/v2\/posts\/4043\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/us.etg-it.com\/wp-json\/wp\/v2\/media\/4042"}],"wp:attachment":[{"href":"https:\/\/us.etg-it.com\/wp-json\/wp\/v2\/media?parent=4043"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/us.etg-it.com\/wp-json\/wp\/v2\/categories?post=4043"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/us.etg-it.com\/wp-json\/wp\/v2\/tags?post=4043"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}