
Let's talk about threat intelligence feeds. There are right ways and wrong ways to handle cyber threat intelligence. The wrong way to do cyber threat intelligence is to spend a lot of money for bad IP addresses, bad URLs, bad domains. When we purchase that, a lot of those entries are old. It's talking about attacks that happened on another organization a week ago, a month ago, a year ago. It is not something that is necessarily relevant to what is going against your organization today. Let me further clarify. At Black Hills Information Security, we do over 670 security assessments and pen tests per year. The IP addresses that we are using today are not the same IP addresses that we
used three days ago. They are not the same domains that we used a month ago. We are constantly staying ahead of the detection wave where people are detecting the techniques, the websites, the URLs, the IP addresses that we use every single day. So almost by nature, much of what you get from cyber threat intelligence is out ofd before it even hits your organization as well. So I think deception can be a technology that is cyber threat intelligence against your organization right