Hi All,
Having had access to some a few different CTI instances (Mainly OpenCTI, OTX, MISP), I am coming to the view that without careful curation they can just become a messy database of indicators, reports and other data.
One of the other things I am noticing is that a couple of "better curated" CTIs tend to not have heaps of tactical indicators, and are more focussed on operational IOCs.
Overall, it seems that if you are not prepared to spend big money for a SaaS platform like Mandiant and RecordedFuture, you are going to be spending a lot of time building up your own platform and requiring resources to do this, and it will potentially take years to build up the CTI.
So where my question is going is - If you are going to deploy your own CTI platform with say OpenCTI or MISP, how is your data being ingested and consumed?
Or am I just completely overthinking the concepts of a CTI platform? 🙂
FYI- I don't think I've seen people abbreviate cyber threat intelligence as CTI.
Took me a while to figure out what you were referring to. I don't think its that widely use.
Its always a good idea to explain your abbreviation at the start for lesser known ones.