Threat intelligence is such a young industry, at least in the prowess of the private sector anyway.
Are all of us private sector intelligence operators confused, running into different vendors, collecting indicators, building pseudorandom relationships, smacking around threat reports, writing advisories, and continously refining our processes until 'ok this is sexy enough'?
We're like confused SOC analysts, I guess.
If threat intel analysts were Pokemon, we'd be Psyducks wearing suits and sunglasses.
To be clear, since this was taken quite literally: this thread is a joke.

I'm not a confused psyduck running into walls. Yes, threat intelligence is difficult to navigate. No, this shouldn't discourage you from pursuing it.
It's a young industry, structure and framework will come. But again, threat intelligence is a baby in cybersecurity right now. Let it learn and grow, even if that has some hiccups.
You can follow @CryptoCypher.
Tip: mention @twtextapp on a Twitter thread with the keyword “unroll” to get a link to it.

Latest Threads Unrolled: