{"id":29475,"date":"2024-05-29T04:01:58","date_gmt":"2024-05-29T04:01:58","guid":{"rendered":"https:\/\/nsfocusglobal.com\/?p=29475"},"modified":"2026-04-17T18:07:37","modified_gmt":"2026-04-17T18:07:37","slug":"contextual-intelligence-is-the-key","status":"publish","type":"post","link":"https:\/\/nsfocusglobal.com\/pt-br\/contextual-intelligence-is-the-key\/","title":{"rendered":"Contextual Intelligence is the Key"},"content":{"rendered":"<!DOCTYPE html PUBLIC \"-\/\/W3C\/\/DTD HTML 4.0 Transitional\/\/EN\" \"http:\/\/www.w3.org\/TR\/REC-html40\/loose.dtd\">\n<html><body><p>With the increasing complexity and frequency of cybersecurity threats, organizations face many network threats. The importance of threat intelligence has become increasingly prominent.<\/p>\n\n\n\n<p>During this year&#8217;s RSA Conference, Sierra Stanczyk, the Senior Manager of Global Threat intelligence at PwC, and Allison Wikoff, the Director of Global Threat Intelligence for the Americas at PwC, shared &#8220;<a href=\"https:\/\/www.rsaconference.com\/library\/presentation\/usa\/2024\/connecting%20the%20dots%20threat%20intelligence%20cyber%20incidents%20and%20materiality\" target=\"_blank\" rel=\"noreferrer noopener\">Connecting the Dots: Threat Intelligence, Cyber Incidents, and Materiality<\/a>,&#8221; introducing the application of threat intelligence in the process of responding to cybersecurity incidents based on some practical cases.<\/p>\n\n\n\n<p>Their insights resonate with our core beliefs at NSFOCUS, where we advocate for a proactive approach to safeguarding digital assets:<\/p>\n\n\n\n<ul class=\"wp-block-list\" type=\"1\" start=\"1\">\n<li><strong>The Importance of Context:<\/strong> Stanczyk and Wikoff highlighted how threat intelligence provides the essential context in incident response, enabling a more strategic and informed approach to cybersecurity.<\/li>\n\n\n\n<li><strong>Regulatory Compliance:<\/strong> With new SEC regulations requiring prompt disclosure of significant cybersecurity incidents, accurate and timely threat intelligence is paramount.<\/li>\n\n\n\n<li><strong>Layered Threat Intelligence:<\/strong> The speakers proposed a pyramid model that categorizes threat intelligence into tactical, operational, and strategic levels, each offering unique insights for effective cybersecurity measures.<\/li>\n\n\n\n<li><strong>Proactive Defense:<\/strong> By using threat intelligence to connect the dots between various security events, organizations can move from a reactive to a proactive stance, anticipating and mitigating threats before they escalate.<\/li>\n<\/ul>\n\n\n\n<p><\/p>\n\n\n\n<p>Here is a portion of the content from the speech.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">I. Connecting the Dots<\/h2>\n\n\n\n<p>Stanczyk and Wikoff&#8217;s sharing began with the new regulations from the SEC (US Security and Exchange Commission). In December 2023, the SEC proposed a regulation on the disclosure of cybersecurity incidents. According to the regulation, when a significant cybersecurity incident occurs, organizations are required to submit detailed information about the incident and its potentially significant impact within four working days. However, the regulation does not clearly define the criteria for significant events. Therefore, the two sharers proposed that threat intelligence can be used in this link to assess the importance of events.<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-full\"><a href=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2024\/05\/Fig-1-1.png\"><img fetchpriority=\"high\" decoding=\"async\" width=\"554\" height=\"317\" src=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2024\/05\/Fig-1-1.png\" alt=\"Red circular no entry sign with a white horizontal bar.\" class=\"wp-image-29504\" srcset=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2024\/05\/Fig-1-1.png 554w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2024\/05\/Fig-1-1-300x172.png 300w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2024\/05\/Fig-1-1-150x85.png 150w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2024\/05\/Fig-1-1-200x114.png 200w\" sizes=\"(max-width: 554px) 100vw, 554px\" \/><\/a><figcaption class=\"wp-element-caption\">Figure 1. Objective Factors for Judging the Importance of Cybersecurity Incidents<\/figcaption><\/figure>\n<\/div>\n\n\n<p><\/p>\n\n\n\n<p>Stanczyk used a pyramid model to divide threat intelligence into three levels: Tactical, Operational, and Strategic. Tactical threat intelligence focuses on threat actor indicators and other data details, helping to predict or identify attack behavior as early as possible; Operational threat intelligence focuses on recording the attack methods (TTPs) of threat actors, helping to fully understand the implementation of attack activities and formulate response strategies; Strategic threat intelligence involves the behavior, motives of threat actors, and their possible next actions.<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-large is-resized\"><a href=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2024\/05\/Figure-2-1.png\"><img decoding=\"async\" src=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2024\/05\/Figure-2-1-1024x549.png\" alt=\"Red circular no entry sign with a white horizontal bar.\" class=\"wp-image-29506\" width=\"554\" height=\"316\"><\/a><figcaption class=\"wp-element-caption\">Figure 2. Threat Intelligence in Three Levels<\/figcaption><\/figure>\n<\/div>\n\n\n<p><\/p>\n\n\n\n<p>By connecting a large amount of fragmented information, the intelligence at these three levels runs through the entire process of incident analysis, providing five aspects of information for responders, including:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Nature of the attack or incident<\/li>\n\n\n\n<li>Characteristics of the threat actors<\/li>\n\n\n\n<li>Systems and information compromised<\/li>\n\n\n\n<li>Timeline and nature of response<\/li>\n\n\n\n<li>Potential ongoing effects and future trends<\/li>\n<\/ul>\n\n\n\n<p>Using these five types of information, responders can quickly understand the ins and outs of cybersecurity incidents.<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-large is-resized\"><a href=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2024\/05\/Figure-3-2.png\"><img decoding=\"async\" src=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2024\/05\/Figure-3-2-1024x560.png\" alt=\"Red circular no entry sign with a white horizontal bar.\" class=\"wp-image-29508\" width=\"554\" height=\"375\"><\/a><figcaption class=\"wp-element-caption\">Figure 3 Threat Intelligence in Incident Response<\/figcaption><\/figure>\n<\/div>\n\n\n<p><\/p>\n\n\n\n<p>Stanczyk stated that in a company or organization, the value of threat intelligence can be reflected in many links. Including threat management before and after the incident handling process, prioritization, analysis, correlation, and other tasks like daily monitoring, detection, security architecture design, decision-making, etc. &nbsp;The three levels of threat intelligence can provide valuable information to all roles from security responders to decision-makers.<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-large is-resized\"><a href=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2024\/05\/Figure-4-1.png\"><img decoding=\"async\" src=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2024\/05\/Figure-4-1-1024x520.png\" alt=\"Red circular no entry sign with a white horizontal bar.\" class=\"wp-image-29510\" width=\"554\" srcset=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2024\/05\/Figure-4-1-1024x520.png 1024w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2024\/05\/Figure-4-1-300x152.png 300w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2024\/05\/Figure-4-1-768x390.png 768w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2024\/05\/Figure-4-1-600x305.png 600w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2024\/05\/Figure-4-1-200x102.png 200w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2024\/05\/Figure-4-1.png 1155w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/a><figcaption class=\"wp-element-caption\">Figure 4 Threat Intelligence&#8217;s Applications in Organizations<\/figcaption><\/figure>\n<\/div>\n\n\n<p><\/p>\n\n\n\n<p>Then, Stanczyk and Wikoff used five cases to demonstrate the value of threat intelligence in analyzing and judging the importance of cybersecurity incidents. Here is one of them.<\/p>\n\n\n\n<p>If traces of internal network penetration tools are found in a company&#8217;s system, and some strange scheduled tasks are also found, how to judge whether the company is currently under attack? What kind of handling strategy should be adopted? Is this incident a significant event that needs to be reported?<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-full\"><a href=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2024\/05\/Figure-5-2.png\"><img loading=\"lazy\" decoding=\"async\" width=\"554\" height=\"304\" src=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2024\/05\/Figure-5-2.png\" alt=\"Red circular no entry sign with a white horizontal bar.\" class=\"wp-image-29518\" srcset=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2024\/05\/Figure-5-2.png 554w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2024\/05\/Figure-5-2-300x165.png 300w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2024\/05\/Figure-5-2-200x110.png 200w\" sizes=\"(max-width: 554px) 100vw, 554px\" \/><\/a><figcaption class=\"wp-element-caption\">Figure 5 Company Attacked by Ransomware<\/figcaption><\/figure>\n<\/div>\n\n\n<p><\/p>\n\n\n\n<p>The figure above shows a typical ransomware attack process. Before the attack occurs, the victim can only find a few clues in the few links in the figure. Based on these few pieces of information, it is difficult to make a global judgment. In fact, this may be a ransom attack from a notorious hacker group, and many companies have already suffered from ransom, resulting in huge losses. The company&#8217;s network has been invaded and has become the next ransom target of the hacker group. With the aid of threat intelligence, known clues can be associated with the hacker group&#8217;s preferred attack tools, so as to discover and handle them in time.<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-large is-resized\"><a href=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2024\/05\/Figure-6-1.png\"><img decoding=\"async\" src=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2024\/05\/Figure-6-1-1024x576.png\" alt=\"Red circular no entry sign with a white horizontal bar.\" class=\"wp-image-29514\" width=\"554\" srcset=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2024\/05\/Figure-6-1-1024x576.png 1024w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2024\/05\/Figure-6-1-300x169.png 300w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2024\/05\/Figure-6-1-768x432.png 768w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2024\/05\/Figure-6-1-150x85.png 150w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2024\/05\/Figure-6-1-600x337.png 600w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2024\/05\/Figure-6-1-200x112.png 200w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2024\/05\/Figure-6-1.png 1080w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/a><figcaption class=\"wp-element-caption\">Figure 6. Attack Records of a Hacker Group<\/figcaption><\/figure>\n<\/div>\n\n\n<p><\/p>\n\n\n\n<p>In addition to the above case study, the speakers also listed four other typical scenarios, including Phishing, APT attacks, identity theft with the help of AI, and dark web data leaks. Threat intelligence can be of great help in dealing with these typical issues.<\/p>\n\n\n\n<p>Then, Stanczyk shared how to build a threat intelligence capability foundation, which mainly includes five steps: forming a threat intelligence team, establishing close internal communication, granting appropriate internal authority, setting intelligence priorities, and obtaining rich external intelligence sources.<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-large is-resized\"><a href=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2024\/05\/Figure-7-1.png\"><img decoding=\"async\" src=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2024\/05\/Figure-7-1-1024x525.png\" alt=\"Red circular no entry sign with a white horizontal bar.\" class=\"wp-image-29516\" width=\"554\" srcset=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2024\/05\/Figure-7-1-1024x525.png 1024w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2024\/05\/Figure-7-1-300x154.png 300w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2024\/05\/Figure-7-1-768x394.png 768w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2024\/05\/Figure-7-1-600x308.png 600w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2024\/05\/Figure-7-1-200x103.png 200w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2024\/05\/Figure-7-1.png 1164w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/a><figcaption class=\"wp-element-caption\">Figure 7 Building a Threat Intelligence Capability Foundation<\/figcaption><\/figure>\n<\/div>\n\n\n<p><\/p>\n\n\n\n<p>Finally, the speakers concluded that the context of an event is the key to the process of event handling, and threat intelligence plays an important role in providing context.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">II. From Reactive to Proactive: Transforming Cyber Defense with Threat Intelligence<\/h2>\n\n\n\n<p>As cyber-attacks get more complicated, organizations can struggle to handle cybersecurity problems. Threat intelligence collects a lot of information from different places. This helps make sense of what&#8217;s happening during an incident, like piecing together a puzzle. It&#8217;s like helping someone who can&#8217;t see the whole picture to understand what&#8217;s really going on. This can not only be reflected in the process of judging the importance of events shared by Stanczyk and Wikoff but also greatly help organizations adopt a more proactive defense strategy.<\/p>\n\n\n\n<p>For example, in phishing attacks, threat intelligence can be used to associate and retrieve malicious links and samples after receiving a phishing email, in conjunction with cyberspace mapping, to carry out batch blocking in a more proactive manner.<\/p>\n\n\n\n<p>NSFOCUS Threat Intelligence (NTI) service and NSFOCUS Threat Intelligence Platform (NTIP) provide intelligence data on the current hotspots of cybersecurity events, including APT, mining, anti-fraud, ransom, dark web, and compromised intelligence, to realize intelligence-driven monitoring of key cybersecurity events and enhance proactive defense capabilities.<\/p>\n\n\n\n<p>NSFOCUS&acirc;&euro;&trade;s TI service and platform empowers organizations to:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Assess Incidents Quickly:<\/strong> With real-time intelligence, organizations can rapidly evaluate the significance of cybersecurity events and respond accordingly.<\/li>\n\n\n\n<li><strong>Prioritize Threats:<\/strong> By understanding the context and potential impact, our platform helps prioritize threats based on their severity and likelihood.<\/li>\n\n\n\n<li><strong>Enhance Decision-Making:<\/strong> Leveraging multi-sourced intelligence, our platform equips decision-makers with the data needed to make informed choices about their security posture.<\/li>\n\n\n\n<li><strong>Implement Strategic Defenses:<\/strong> By anticipating future trends and potential attack vectors, NSFOCUS Threat Intelligence Platform supports the development of strategic defenses that stay one step ahead of threats.<\/li>\n<\/ul>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-large is-resized\"><a href=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2024\/05\/Figure-8-1.png\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2024\/05\/Figure-8-1-1024x571.png\" alt=\"Red circular no entry sign with a white horizontal bar.\" class=\"wp-image-29498\" width=\"685\" height=\"381\" srcset=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2024\/05\/Figure-8-1-1024x571.png 1024w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2024\/05\/Figure-8-1-300x167.png 300w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2024\/05\/Figure-8-1-768x428.png 768w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2024\/05\/Figure-8-1-1536x856.png 1536w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2024\/05\/Figure-8-1-1170x650.png 1170w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2024\/05\/Figure-8-1-600x335.png 600w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2024\/05\/Figure-8-1-200x112.png 200w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2024\/05\/Figure-8-1.png 1849w\" sizes=\"(max-width: 685px) 100vw, 685px\" \/><\/a><figcaption class=\"wp-element-caption\">Figure 8. NSFOCUS Threat Intelligence Platform<\/figcaption><\/figure>\n<\/div>\n\n\n<p><\/p>\n\n\n\n<p>For inquiries regarding NSFOCUS Threat Intelligence Platform (NTIP), don&#8217;t hesitate to<a href=\"https:\/\/nsfocusglobal.com\/pt-br\/contact-us\/\" target=\"_blank\" rel=\"noreferrer noopener\"> reach out to us<\/a>. <\/p>\n\n\n\n<p><\/p>\n<\/body><\/html>\n","protected":false},"excerpt":{"rendered":"<p>With the increasing complexity and frequency of cybersecurity threats, organizations face many network threats. The importance of threat intelligence has become increasingly prominent. During this year&#8217;s RSA Conference, Sierra Stanczyk, the Senior Manager of Global Threat intelligence at PwC, and Allison Wikoff, the Director of Global Threat Intelligence for the Americas at PwC, shared &#8220;Connecting [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":24584,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_coblocks_attr":"","_coblocks_dimensions":"","_coblocks_responsive_height":"","_coblocks_accordion_ie_support":"","footnotes":""},"categories":[3],"tags":[693],"class_list":["post-29475","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-blog","tag-threat-intelligence"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Contextual Intelligence is the Key - NSFOCUS<\/title>\n<meta name=\"description\" content=\"Learn how contextual intelligence transforms your organization&#039;s approach to cyber threats and proactive defense. Contact us for more info on TI platform.\" \/>\n<meta name=\"robots\" content=\"noindex, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<meta property=\"og:locale\" content=\"pt_BR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Contextual Intelligence is the Key - NSFOCUS\" \/>\n<meta property=\"og:description\" content=\"Learn how contextual intelligence transforms your organization&#039;s approach to cyber threats and proactive defense. Contact us for more info on TI platform.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/nsfocusglobal.com\/contextual-intelligence-is-the-key\/\" \/>\n<meta property=\"og:site_name\" content=\"NSFOCUS\" \/>\n<meta property=\"article:published_time\" content=\"2024-05-29T04:01:58+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2026-04-17T18:07:37+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2023\/06\/NSFOCUS-Threat-Intelligence-Listed-in-Gartner-Report-Again.jpg\" \/>\n<meta name=\"author\" content=\"admin\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:title\" content=\"Contextual Intelligence is the Key - NSFOCUS\" \/>\n<meta name=\"twitter:description\" content=\"Learn how contextual intelligence transforms your organization&#039;s approach to cyber threats and proactive defense. Contact us for more info on TI platform.\" \/>\n<meta name=\"twitter:image\" content=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2023\/06\/NSFOCUS-Threat-Intelligence-Listed-in-Gartner-Report-Again.jpg\" \/>\n<meta name=\"twitter:label1\" content=\"Escrito por\" \/>\n\t<meta name=\"twitter:data1\" content=\"admin\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. tempo de leitura\" \/>\n\t<meta name=\"twitter:data2\" content=\"7 minutos\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/contextual-intelligence-is-the-key\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/contextual-intelligence-is-the-key\\\/\"},\"author\":{\"name\":\"admin\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/#\\\/schema\\\/person\\\/fd9ab61c9c77a81bbd870f725cc0c61d\"},\"headline\":\"Contextual Intelligence is the Key\",\"datePublished\":\"2024-05-29T04:01:58+00:00\",\"dateModified\":\"2026-04-17T18:07:37+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/contextual-intelligence-is-the-key\\\/\"},\"wordCount\":1188,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/contextual-intelligence-is-the-key\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/nsfocusglobal.com\\\/wp-content\\\/uploads\\\/2023\\\/06\\\/NSFOCUS-Threat-Intelligence-Listed-in-Gartner-Report-Again.jpg\",\"keywords\":[\"threat intelligence\"],\"articleSection\":[\"Blog\"],\"inLanguage\":\"pt-BR\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/nsfocusglobal.com\\\/contextual-intelligence-is-the-key\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/contextual-intelligence-is-the-key\\\/\",\"url\":\"https:\\\/\\\/nsfocusglobal.com\\\/contextual-intelligence-is-the-key\\\/\",\"name\":\"Contextual Intelligence is the Key - NSFOCUS\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/contextual-intelligence-is-the-key\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/contextual-intelligence-is-the-key\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/nsfocusglobal.com\\\/wp-content\\\/uploads\\\/2023\\\/06\\\/NSFOCUS-Threat-Intelligence-Listed-in-Gartner-Report-Again.jpg\",\"datePublished\":\"2024-05-29T04:01:58+00:00\",\"dateModified\":\"2026-04-17T18:07:37+00:00\",\"description\":\"Learn how contextual intelligence transforms your organization's approach to cyber threats and proactive defense. Contact us for more info on TI platform.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/contextual-intelligence-is-the-key\\\/#breadcrumb\"},\"inLanguage\":\"pt-BR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/nsfocusglobal.com\\\/contextual-intelligence-is-the-key\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"pt-BR\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/contextual-intelligence-is-the-key\\\/#primaryimage\",\"url\":\"https:\\\/\\\/nsfocusglobal.com\\\/wp-content\\\/uploads\\\/2023\\\/06\\\/NSFOCUS-Threat-Intelligence-Listed-in-Gartner-Report-Again.jpg\",\"contentUrl\":\"https:\\\/\\\/nsfocusglobal.com\\\/wp-content\\\/uploads\\\/2023\\\/06\\\/NSFOCUS-Threat-Intelligence-Listed-in-Gartner-Report-Again.jpg\",\"width\":1612,\"height\":788,\"caption\":\"Search interface with trending searches and vulnerabilities.\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/contextual-intelligence-is-the-key\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/nsfocusglobal.com\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Contextual Intelligence is the Key\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/#website\",\"url\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/\",\"name\":\"NSFOCUS\",\"description\":\"Security Made Smart and Simple\",\"publisher\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"pt-BR\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/#organization\",\"name\":\"NSFOCUS\",\"url\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"pt-BR\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/nsfocusglobal.com\\\/wp-content\\\/uploads\\\/2024\\\/08\\\/logo-ns.png\",\"contentUrl\":\"https:\\\/\\\/nsfocusglobal.com\\\/wp-content\\\/uploads\\\/2024\\\/08\\\/logo-ns.png\",\"width\":248,\"height\":36,\"caption\":\"NSFOCUS\"},\"image\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/#\\\/schema\\\/person\\\/fd9ab61c9c77a81bbd870f725cc0c61d\",\"name\":\"admin\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"pt-BR\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/d3dc987908fc59791d261b1006d84eb931d15287261476b9384e690ed0c568de?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/d3dc987908fc59791d261b1006d84eb931d15287261476b9384e690ed0c568de?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/d3dc987908fc59791d261b1006d84eb931d15287261476b9384e690ed0c568de?s=96&d=mm&r=g\",\"caption\":\"admin\"},\"sameAs\":[\"https:\\\/\\\/nsfocusglobal.com\"],\"url\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/author\\\/admin\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Contextual Intelligence is the Key - NSFOCUS","description":"Learn how contextual intelligence transforms your organization's approach to cyber threats and proactive defense. Contact us for more info on TI platform.","robots":{"index":"noindex","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"og_locale":"pt_BR","og_type":"article","og_title":"Contextual Intelligence is the Key - NSFOCUS","og_description":"Learn how contextual intelligence transforms your organization&#039;s approach to cyber threats and proactive defense. Contact us for more info on TI platform.","og_url":"https:\/\/nsfocusglobal.com\/contextual-intelligence-is-the-key\/","og_site_name":"NSFOCUS","article_published_time":"2024-05-29T04:01:58+00:00","article_modified_time":"2026-04-17T18:07:37+00:00","og_image":[{"url":"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2023\/06\/NSFOCUS-Threat-Intelligence-Listed-in-Gartner-Report-Again.jpg","type":"","width":"","height":""}],"author":"admin","twitter_card":"summary_large_image","twitter_title":"Contextual Intelligence is the Key - NSFOCUS","twitter_description":"Learn how contextual intelligence transforms your organization&#039;s approach to cyber threats and proactive defense. Contact us for more info on TI platform.","twitter_image":"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2023\/06\/NSFOCUS-Threat-Intelligence-Listed-in-Gartner-Report-Again.jpg","twitter_misc":{"Escrito por":"admin","Est. tempo de leitura":"7 minutos"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/nsfocusglobal.com\/contextual-intelligence-is-the-key\/#article","isPartOf":{"@id":"https:\/\/nsfocusglobal.com\/contextual-intelligence-is-the-key\/"},"author":{"name":"admin","@id":"https:\/\/nsfocusglobal.com\/pt-br\/#\/schema\/person\/fd9ab61c9c77a81bbd870f725cc0c61d"},"headline":"Contextual Intelligence is the Key","datePublished":"2024-05-29T04:01:58+00:00","dateModified":"2026-04-17T18:07:37+00:00","mainEntityOfPage":{"@id":"https:\/\/nsfocusglobal.com\/contextual-intelligence-is-the-key\/"},"wordCount":1188,"commentCount":0,"publisher":{"@id":"https:\/\/nsfocusglobal.com\/pt-br\/#organization"},"image":{"@id":"https:\/\/nsfocusglobal.com\/contextual-intelligence-is-the-key\/#primaryimage"},"thumbnailUrl":"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2023\/06\/NSFOCUS-Threat-Intelligence-Listed-in-Gartner-Report-Again.jpg","keywords":["threat intelligence"],"articleSection":["Blog"],"inLanguage":"pt-BR","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/nsfocusglobal.com\/contextual-intelligence-is-the-key\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/nsfocusglobal.com\/contextual-intelligence-is-the-key\/","url":"https:\/\/nsfocusglobal.com\/contextual-intelligence-is-the-key\/","name":"Contextual Intelligence is the Key - NSFOCUS","isPartOf":{"@id":"https:\/\/nsfocusglobal.com\/pt-br\/#website"},"primaryImageOfPage":{"@id":"https:\/\/nsfocusglobal.com\/contextual-intelligence-is-the-key\/#primaryimage"},"image":{"@id":"https:\/\/nsfocusglobal.com\/contextual-intelligence-is-the-key\/#primaryimage"},"thumbnailUrl":"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2023\/06\/NSFOCUS-Threat-Intelligence-Listed-in-Gartner-Report-Again.jpg","datePublished":"2024-05-29T04:01:58+00:00","dateModified":"2026-04-17T18:07:37+00:00","description":"Learn how contextual intelligence transforms your organization's approach to cyber threats and proactive defense. Contact us for more info on TI platform.","breadcrumb":{"@id":"https:\/\/nsfocusglobal.com\/contextual-intelligence-is-the-key\/#breadcrumb"},"inLanguage":"pt-BR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/nsfocusglobal.com\/contextual-intelligence-is-the-key\/"]}]},{"@type":"ImageObject","inLanguage":"pt-BR","@id":"https:\/\/nsfocusglobal.com\/contextual-intelligence-is-the-key\/#primaryimage","url":"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2023\/06\/NSFOCUS-Threat-Intelligence-Listed-in-Gartner-Report-Again.jpg","contentUrl":"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2023\/06\/NSFOCUS-Threat-Intelligence-Listed-in-Gartner-Report-Again.jpg","width":1612,"height":788,"caption":"Search interface with trending searches and vulnerabilities."},{"@type":"BreadcrumbList","@id":"https:\/\/nsfocusglobal.com\/contextual-intelligence-is-the-key\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/nsfocusglobal.com\/"},{"@type":"ListItem","position":2,"name":"Contextual Intelligence is the Key"}]},{"@type":"WebSite","@id":"https:\/\/nsfocusglobal.com\/pt-br\/#website","url":"https:\/\/nsfocusglobal.com\/pt-br\/","name":"NSFOCUS","description":"Security Made Smart and Simple","publisher":{"@id":"https:\/\/nsfocusglobal.com\/pt-br\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/nsfocusglobal.com\/pt-br\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"pt-BR"},{"@type":"Organization","@id":"https:\/\/nsfocusglobal.com\/pt-br\/#organization","name":"NSFOCUS","url":"https:\/\/nsfocusglobal.com\/pt-br\/","logo":{"@type":"ImageObject","inLanguage":"pt-BR","@id":"https:\/\/nsfocusglobal.com\/pt-br\/#\/schema\/logo\/image\/","url":"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2024\/08\/logo-ns.png","contentUrl":"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2024\/08\/logo-ns.png","width":248,"height":36,"caption":"NSFOCUS"},"image":{"@id":"https:\/\/nsfocusglobal.com\/pt-br\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/nsfocusglobal.com\/pt-br\/#\/schema\/person\/fd9ab61c9c77a81bbd870f725cc0c61d","name":"admin","image":{"@type":"ImageObject","inLanguage":"pt-BR","@id":"https:\/\/secure.gravatar.com\/avatar\/d3dc987908fc59791d261b1006d84eb931d15287261476b9384e690ed0c568de?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/d3dc987908fc59791d261b1006d84eb931d15287261476b9384e690ed0c568de?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/d3dc987908fc59791d261b1006d84eb931d15287261476b9384e690ed0c568de?s=96&d=mm&r=g","caption":"admin"},"sameAs":["https:\/\/nsfocusglobal.com"],"url":"https:\/\/nsfocusglobal.com\/pt-br\/author\/admin\/"}]}},"_links":{"self":[{"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/posts\/29475","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/comments?post=29475"}],"version-history":[{"count":0,"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/posts\/29475\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/media\/24584"}],"wp:attachment":[{"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/media?parent=29475"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/categories?post=29475"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/tags?post=29475"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}