{"id":4047,"date":"2016-11-07T01:00:29","date_gmt":"2016-11-07T01:00:29","guid":{"rendered":"http:\/\/staging.nsfocusglobal.com\/?p=4047"},"modified":"2016-11-07T01:00:29","modified_gmt":"2016-11-07T01:00:29","slug":"myth-threat-intelligence-channel-intelligent-hybrid-security-approach","status":"publish","type":"post","link":"https:\/\/nsfocusglobal.com\/pt-br\/myth-threat-intelligence-channel-intelligent-hybrid-security-approach\/","title":{"rendered":"The Myth Of Threat Intelligence In The Channel, And An Intelligent Hybrid Security Approach"},"content":{"rendered":"<p>Business Solutions Magazine &#8211; Over the last year, Threat Intelligence (TI) has become a hot topic for the cybersecurity industry. Organizations of all sizes are looking to the channel to provide recommendations on what to purchase, how to implement, and how to gain the greatest value from TI. It is therefore critical the channel clearly understands what TI is, and how organizations can capitalize on its value. Why Does The Industry Need Threat Intelligence? Today, there are billions of computing devices (computers, smart phones, IoT, etc.) connected to the Internet. Once IPv6 is fully adopted, more and more devices will be on the Internet than ever before. It\u2019s not a stretch to believe there will be more than a trillion devices connected before the end of this decade. Currently, there are nearly 300 million domain names registered world-wide across all top-level domains with billions of unique URLs. Finally, there are tens-of-millions of unique pieces of malware infecting and controlling devices all over the Internet.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Business Solutions Magazine &#8211; Over the last year, Threat Intelligence (TI) has become a hot topic for the cybersecurity industry. Organizations of all sizes are looking to the channel to provide recommendations on what to purchase, how to implement, and how to gain the greatest value from TI. It is therefore critical the channel clearly [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":12345,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_coblocks_attr":"","_coblocks_dimensions":"","_coblocks_responsive_height":"","_coblocks_accordion_ie_support":"","footnotes":""},"categories":[11],"tags":[],"class_list":["post-4047","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-news"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>The Myth Of Threat Intelligence In The Channel, And An Intelligent Hybrid Security Approach - NSFOCUS<\/title>\n<meta name=\"robots\" content=\"noindex, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<meta property=\"og:locale\" content=\"pt_BR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"The Myth Of Threat Intelligence In The Channel, And An Intelligent Hybrid Security Approach - NSFOCUS\" \/>\n<meta property=\"og:description\" content=\"Business Solutions Magazine - Over the last year, Threat Intelligence (TI) has become a hot topic for the cybersecurity industry. Organizations of all\" \/>\n<meta property=\"og:url\" content=\"https:\/\/nsfocusglobal.com\/myth-threat-intelligence-channel-intelligent-hybrid-security-approach\/\" \/>\n<meta property=\"og:site_name\" content=\"NSFOCUS\" \/>\n<meta property=\"article:published_time\" content=\"2016-11-07T01:00:29+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2020\/12\/1224-1.jpg\" \/>\n<meta name=\"author\" content=\"admin\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:title\" content=\"The Myth Of Threat Intelligence In The Channel, And An Intelligent Hybrid Security Approach - NSFOCUS\" \/>\n<meta name=\"twitter:description\" content=\"Business Solutions Magazine - Over the last year, Threat Intelligence (TI) has become a hot topic for the cybersecurity industry. Organizations of all\" \/>\n<meta name=\"twitter:image\" content=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2020\/12\/1224-1.jpg\" \/>\n<meta name=\"twitter:label1\" content=\"Escrito por\" \/>\n\t<meta name=\"twitter:data1\" content=\"admin\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. tempo de leitura\" \/>\n\t<meta name=\"twitter:data2\" content=\"1 minuto\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/myth-threat-intelligence-channel-intelligent-hybrid-security-approach\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/myth-threat-intelligence-channel-intelligent-hybrid-security-approach\\\/\"},\"author\":{\"name\":\"admin\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/#\\\/schema\\\/person\\\/fd9ab61c9c77a81bbd870f725cc0c61d\"},\"headline\":\"The Myth Of Threat Intelligence In The Channel, And An Intelligent Hybrid Security Approach\",\"datePublished\":\"2016-11-07T01:00:29+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/myth-threat-intelligence-channel-intelligent-hybrid-security-approach\\\/\"},\"wordCount\":178,\"publisher\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/myth-threat-intelligence-channel-intelligent-hybrid-security-approach\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/nsfocusglobal.com\\\/wp-content\\\/uploads\\\/2020\\\/12\\\/1224-1.jpg\",\"articleSection\":[\"NSFOCUS in the News\"],\"inLanguage\":\"pt-BR\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/myth-threat-intelligence-channel-intelligent-hybrid-security-approach\\\/\",\"url\":\"https:\\\/\\\/nsfocusglobal.com\\\/myth-threat-intelligence-channel-intelligent-hybrid-security-approach\\\/\",\"name\":\"The Myth Of Threat Intelligence In The Channel, And An Intelligent Hybrid Security Approach - NSFOCUS\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/myth-threat-intelligence-channel-intelligent-hybrid-security-approach\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/myth-threat-intelligence-channel-intelligent-hybrid-security-approach\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/nsfocusglobal.com\\\/wp-content\\\/uploads\\\/2020\\\/12\\\/1224-1.jpg\",\"datePublished\":\"2016-11-07T01:00:29+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/myth-threat-intelligence-channel-intelligent-hybrid-security-approach\\\/#breadcrumb\"},\"inLanguage\":\"pt-BR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/nsfocusglobal.com\\\/myth-threat-intelligence-channel-intelligent-hybrid-security-approach\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"pt-BR\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/myth-threat-intelligence-channel-intelligent-hybrid-security-approach\\\/#primaryimage\",\"url\":\"https:\\\/\\\/nsfocusglobal.com\\\/wp-content\\\/uploads\\\/2020\\\/12\\\/1224-1.jpg\",\"contentUrl\":\"https:\\\/\\\/nsfocusglobal.com\\\/wp-content\\\/uploads\\\/2020\\\/12\\\/1224-1.jpg\",\"width\":480,\"height\":401,\"caption\":\"Pie chart showing country data distribution percentages.\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/myth-threat-intelligence-channel-intelligent-hybrid-security-approach\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/nsfocusglobal.com\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"The Myth Of Threat Intelligence In The Channel, And An Intelligent Hybrid Security Approach\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/#website\",\"url\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/\",\"name\":\"NSFOCUS\",\"description\":\"Security Made Smart and Simple\",\"publisher\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"pt-BR\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/#organization\",\"name\":\"NSFOCUS\",\"url\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"pt-BR\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/nsfocusglobal.com\\\/wp-content\\\/uploads\\\/2024\\\/08\\\/logo-ns.png\",\"contentUrl\":\"https:\\\/\\\/nsfocusglobal.com\\\/wp-content\\\/uploads\\\/2024\\\/08\\\/logo-ns.png\",\"width\":248,\"height\":36,\"caption\":\"NSFOCUS\"},\"image\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/#\\\/schema\\\/person\\\/fd9ab61c9c77a81bbd870f725cc0c61d\",\"name\":\"admin\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"pt-BR\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/d3dc987908fc59791d261b1006d84eb931d15287261476b9384e690ed0c568de?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/d3dc987908fc59791d261b1006d84eb931d15287261476b9384e690ed0c568de?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/d3dc987908fc59791d261b1006d84eb931d15287261476b9384e690ed0c568de?s=96&d=mm&r=g\",\"caption\":\"admin\"},\"sameAs\":[\"https:\\\/\\\/nsfocusglobal.com\"],\"url\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/author\\\/admin\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"The Myth Of Threat Intelligence In The Channel, And An Intelligent Hybrid Security Approach - NSFOCUS","robots":{"index":"noindex","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"og_locale":"pt_BR","og_type":"article","og_title":"The Myth Of Threat Intelligence In The Channel, And An Intelligent Hybrid Security Approach - NSFOCUS","og_description":"Business Solutions Magazine - Over the last year, Threat Intelligence (TI) has become a hot topic for the cybersecurity industry. Organizations of all","og_url":"https:\/\/nsfocusglobal.com\/myth-threat-intelligence-channel-intelligent-hybrid-security-approach\/","og_site_name":"NSFOCUS","article_published_time":"2016-11-07T01:00:29+00:00","og_image":[{"url":"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2020\/12\/1224-1.jpg","type":"","width":"","height":""}],"author":"admin","twitter_card":"summary_large_image","twitter_title":"The Myth Of Threat Intelligence In The Channel, And An Intelligent Hybrid Security Approach - NSFOCUS","twitter_description":"Business Solutions Magazine - Over the last year, Threat Intelligence (TI) has become a hot topic for the cybersecurity industry. Organizations of all","twitter_image":"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2020\/12\/1224-1.jpg","twitter_misc":{"Escrito por":"admin","Est. tempo de leitura":"1 minuto"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/nsfocusglobal.com\/myth-threat-intelligence-channel-intelligent-hybrid-security-approach\/#article","isPartOf":{"@id":"https:\/\/nsfocusglobal.com\/myth-threat-intelligence-channel-intelligent-hybrid-security-approach\/"},"author":{"name":"admin","@id":"https:\/\/nsfocusglobal.com\/pt-br\/#\/schema\/person\/fd9ab61c9c77a81bbd870f725cc0c61d"},"headline":"The Myth Of Threat Intelligence In The Channel, And An Intelligent Hybrid Security Approach","datePublished":"2016-11-07T01:00:29+00:00","mainEntityOfPage":{"@id":"https:\/\/nsfocusglobal.com\/myth-threat-intelligence-channel-intelligent-hybrid-security-approach\/"},"wordCount":178,"publisher":{"@id":"https:\/\/nsfocusglobal.com\/pt-br\/#organization"},"image":{"@id":"https:\/\/nsfocusglobal.com\/myth-threat-intelligence-channel-intelligent-hybrid-security-approach\/#primaryimage"},"thumbnailUrl":"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2020\/12\/1224-1.jpg","articleSection":["NSFOCUS in the News"],"inLanguage":"pt-BR"},{"@type":"WebPage","@id":"https:\/\/nsfocusglobal.com\/myth-threat-intelligence-channel-intelligent-hybrid-security-approach\/","url":"https:\/\/nsfocusglobal.com\/myth-threat-intelligence-channel-intelligent-hybrid-security-approach\/","name":"The Myth Of Threat Intelligence In The Channel, And An Intelligent Hybrid Security Approach - NSFOCUS","isPartOf":{"@id":"https:\/\/nsfocusglobal.com\/pt-br\/#website"},"primaryImageOfPage":{"@id":"https:\/\/nsfocusglobal.com\/myth-threat-intelligence-channel-intelligent-hybrid-security-approach\/#primaryimage"},"image":{"@id":"https:\/\/nsfocusglobal.com\/myth-threat-intelligence-channel-intelligent-hybrid-security-approach\/#primaryimage"},"thumbnailUrl":"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2020\/12\/1224-1.jpg","datePublished":"2016-11-07T01:00:29+00:00","breadcrumb":{"@id":"https:\/\/nsfocusglobal.com\/myth-threat-intelligence-channel-intelligent-hybrid-security-approach\/#breadcrumb"},"inLanguage":"pt-BR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/nsfocusglobal.com\/myth-threat-intelligence-channel-intelligent-hybrid-security-approach\/"]}]},{"@type":"ImageObject","inLanguage":"pt-BR","@id":"https:\/\/nsfocusglobal.com\/myth-threat-intelligence-channel-intelligent-hybrid-security-approach\/#primaryimage","url":"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2020\/12\/1224-1.jpg","contentUrl":"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2020\/12\/1224-1.jpg","width":480,"height":401,"caption":"Pie chart showing country data distribution percentages."},{"@type":"BreadcrumbList","@id":"https:\/\/nsfocusglobal.com\/myth-threat-intelligence-channel-intelligent-hybrid-security-approach\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/nsfocusglobal.com\/"},{"@type":"ListItem","position":2,"name":"The Myth Of Threat Intelligence In The Channel, And An Intelligent Hybrid Security Approach"}]},{"@type":"WebSite","@id":"https:\/\/nsfocusglobal.com\/pt-br\/#website","url":"https:\/\/nsfocusglobal.com\/pt-br\/","name":"NSFOCUS","description":"Security Made Smart and Simple","publisher":{"@id":"https:\/\/nsfocusglobal.com\/pt-br\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/nsfocusglobal.com\/pt-br\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"pt-BR"},{"@type":"Organization","@id":"https:\/\/nsfocusglobal.com\/pt-br\/#organization","name":"NSFOCUS","url":"https:\/\/nsfocusglobal.com\/pt-br\/","logo":{"@type":"ImageObject","inLanguage":"pt-BR","@id":"https:\/\/nsfocusglobal.com\/pt-br\/#\/schema\/logo\/image\/","url":"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2024\/08\/logo-ns.png","contentUrl":"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2024\/08\/logo-ns.png","width":248,"height":36,"caption":"NSFOCUS"},"image":{"@id":"https:\/\/nsfocusglobal.com\/pt-br\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/nsfocusglobal.com\/pt-br\/#\/schema\/person\/fd9ab61c9c77a81bbd870f725cc0c61d","name":"admin","image":{"@type":"ImageObject","inLanguage":"pt-BR","@id":"https:\/\/secure.gravatar.com\/avatar\/d3dc987908fc59791d261b1006d84eb931d15287261476b9384e690ed0c568de?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/d3dc987908fc59791d261b1006d84eb931d15287261476b9384e690ed0c568de?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/d3dc987908fc59791d261b1006d84eb931d15287261476b9384e690ed0c568de?s=96&d=mm&r=g","caption":"admin"},"sameAs":["https:\/\/nsfocusglobal.com"],"url":"https:\/\/nsfocusglobal.com\/pt-br\/author\/admin\/"}]}},"_links":{"self":[{"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/posts\/4047","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/comments?post=4047"}],"version-history":[{"count":0,"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/posts\/4047\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/media\/12345"}],"wp:attachment":[{"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/media?parent=4047"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/categories?post=4047"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/tags?post=4047"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}