Using the Threat Intelligence Portal to become your own cyberdetective
How an analyst can build a threat intelligence workflow to run effective and complex investigations.