{"id":4965,"date":"2026-03-03T09:15:35","date_gmt":"2026-03-03T08:15:35","guid":{"rendered":"https:\/\/enthec.com\/cyber-threat-intelligence\/"},"modified":"2026-03-04T10:15:26","modified_gmt":"2026-03-04T09:15:26","slug":"cyber-threat-intelligence","status":"publish","type":"post","link":"https:\/\/enthec.com\/en\/cyber-threat-intelligence\/","title":{"rendered":"Cyber Threat Intelligence"},"content":{"rendered":"<h4>Cyber Threat Intelligence<\/h4>\n<p>Organisations today are complex entities with extended perimeters that are difficult to delimit, which need, in addition to defence and protection strategies, intelligence strategies to manage exposure to threats. In this paper we compare perimeter cybersecurity and extended cybersecurity strategies and analyse how AI is one of the determinants of success in the new cybersecurity paradigm: cyber threat intelligence.<\/p>\n<p><span style=\"color: #ff0000;\"><a style=\"color: #ff0000;\" href=\"https:\/\/enthec.com\/wp-content\/uploads\/2025\/02\/WP-IA-Ciberintelligence.pdf\"><i class=\"fa fa-download\"><\/i> Download Cyber Threat Intelligence Document<\/a><\/span><\/p>\n<p>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Cyber Threat Intelligence Organisations today are complex entities with extended perimeters that are difficult to delimit, which need, in addition [&hellip;]<\/p>\n","protected":false},"author":11,"featured_media":4889,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[96],"tags":[],"class_list":["post-4965","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-descargables-en"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.2 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Cyber Threat Intelligence - ENTHEC \u00b7 Kartos \u00b7 Qondar<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/enthec.com\/en\/cyber-threat-intelligence\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Cyber Threat Intelligence - ENTHEC \u00b7 Kartos \u00b7 Qondar\" \/>\n<meta property=\"og:description\" content=\"Cyber Threat Intelligence Organisations today are complex entities with extended perimeters that are difficult to delimit, which need, in addition [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/enthec.com\/en\/cyber-threat-intelligence\/\" \/>\n<meta property=\"og:site_name\" content=\"ENTHEC \u00b7 Kartos \u00b7 Qondar\" \/>\n<meta property=\"article:published_time\" content=\"2026-03-03T08:15:35+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2026-03-04T09:15:26+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/enthec.com\/wp-content\/uploads\/2026\/03\/Copia-de-Diseno-sin-titulo-6.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1350\" \/>\n\t<meta property=\"og:image:height\" content=\"1350\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Patricia Hernandez\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Patricia Hernandez\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"1 minute\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/enthec.com\/en\/cyber-threat-intelligence\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/enthec.com\/en\/cyber-threat-intelligence\/\"},\"author\":{\"name\":\"Patricia Hernandez\",\"@id\":\"https:\/\/enthec.com\/#\/schema\/person\/ca39e450d4d09a7a39995a9b0a27bfe2\"},\"headline\":\"Cyber Threat Intelligence\",\"datePublished\":\"2026-03-03T08:15:35+00:00\",\"dateModified\":\"2026-03-04T09:15:26+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/enthec.com\/en\/cyber-threat-intelligence\/\"},\"wordCount\":71,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/enthec.com\/#organization\"},\"image\":{\"@id\":\"https:\/\/enthec.com\/en\/cyber-threat-intelligence\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/enthec.com\/wp-content\/uploads\/2026\/03\/Copia-de-Diseno-sin-titulo-6.png\",\"articleSection\":[\"Descargables\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/enthec.com\/en\/cyber-threat-intelligence\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/enthec.com\/en\/cyber-threat-intelligence\/\",\"url\":\"https:\/\/enthec.com\/en\/cyber-threat-intelligence\/\",\"name\":\"Cyber Threat Intelligence - ENTHEC \u00b7 Kartos \u00b7 Qondar\",\"isPartOf\":{\"@id\":\"https:\/\/enthec.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/enthec.com\/en\/cyber-threat-intelligence\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/enthec.com\/en\/cyber-threat-intelligence\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/enthec.com\/wp-content\/uploads\/2026\/03\/Copia-de-Diseno-sin-titulo-6.png\",\"datePublished\":\"2026-03-03T08:15:35+00:00\",\"dateModified\":\"2026-03-04T09:15:26+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/enthec.com\/en\/cyber-threat-intelligence\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/enthec.com\/en\/cyber-threat-intelligence\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/enthec.com\/en\/cyber-threat-intelligence\/#primaryimage\",\"url\":\"https:\/\/enthec.com\/wp-content\/uploads\/2026\/03\/Copia-de-Diseno-sin-titulo-6.png\",\"contentUrl\":\"https:\/\/enthec.com\/wp-content\/uploads\/2026\/03\/Copia-de-Diseno-sin-titulo-6.png\",\"width\":1350,\"height\":1350},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/enthec.com\/en\/cyber-threat-intelligence\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Portada\",\"item\":\"https:\/\/enthec.com\/en\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Cyber Threat Intelligence\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/enthec.com\/#website\",\"url\":\"https:\/\/enthec.com\/\",\"name\":\"ENTHEC\",\"description\":\"Advanced AI-driven Cyber-Surveillance Platform\",\"publisher\":{\"@id\":\"https:\/\/enthec.com\/#organization\"},\"alternateName\":\"ENTHEC \u00b7 Kartos \u00b7 Qondar\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/enthec.com\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/enthec.com\/#organization\",\"name\":\"ENTHEC\",\"alternateName\":\"ENTHEC \u00b7 Kartos \u00b7 Qondar\",\"url\":\"https:\/\/enthec.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/enthec.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/enthec.com\/wp-content\/uploads\/2024\/08\/Fondo-blanco_1.png\",\"contentUrl\":\"https:\/\/enthec.com\/wp-content\/uploads\/2024\/08\/Fondo-blanco_1.png\",\"width\":667,\"height\":131,\"caption\":\"ENTHEC\"},\"image\":{\"@id\":\"https:\/\/enthec.com\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/enthec.com\/#\/schema\/person\/ca39e450d4d09a7a39995a9b0a27bfe2\",\"name\":\"Patricia Hernandez\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/secure.gravatar.com\/avatar\/c651156a56ce73c21e2176bf26f824075ecff236092c7046a60b650fa25eeef5?s=96&d=mm&r=g\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/c651156a56ce73c21e2176bf26f824075ecff236092c7046a60b650fa25eeef5?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/c651156a56ce73c21e2176bf26f824075ecff236092c7046a60b650fa25eeef5?s=96&d=mm&r=g\",\"caption\":\"Patricia Hernandez\"},\"url\":\"https:\/\/enthec.com\/en\/author\/phernandez\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Cyber Threat Intelligence - ENTHEC \u00b7 Kartos \u00b7 Qondar","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/enthec.com\/en\/cyber-threat-intelligence\/","og_locale":"en_US","og_type":"article","og_title":"Cyber Threat Intelligence - ENTHEC \u00b7 Kartos \u00b7 Qondar","og_description":"Cyber Threat Intelligence Organisations today are complex entities with extended perimeters that are difficult to delimit, which need, in addition [&hellip;]","og_url":"https:\/\/enthec.com\/en\/cyber-threat-intelligence\/","og_site_name":"ENTHEC \u00b7 Kartos \u00b7 Qondar","article_published_time":"2026-03-03T08:15:35+00:00","article_modified_time":"2026-03-04T09:15:26+00:00","og_image":[{"width":1350,"height":1350,"url":"https:\/\/enthec.com\/wp-content\/uploads\/2026\/03\/Copia-de-Diseno-sin-titulo-6.png","type":"image\/png"}],"author":"Patricia Hernandez","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Patricia Hernandez","Est. reading time":"1 minute"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/enthec.com\/en\/cyber-threat-intelligence\/#article","isPartOf":{"@id":"https:\/\/enthec.com\/en\/cyber-threat-intelligence\/"},"author":{"name":"Patricia Hernandez","@id":"https:\/\/enthec.com\/#\/schema\/person\/ca39e450d4d09a7a39995a9b0a27bfe2"},"headline":"Cyber Threat Intelligence","datePublished":"2026-03-03T08:15:35+00:00","dateModified":"2026-03-04T09:15:26+00:00","mainEntityOfPage":{"@id":"https:\/\/enthec.com\/en\/cyber-threat-intelligence\/"},"wordCount":71,"commentCount":0,"publisher":{"@id":"https:\/\/enthec.com\/#organization"},"image":{"@id":"https:\/\/enthec.com\/en\/cyber-threat-intelligence\/#primaryimage"},"thumbnailUrl":"https:\/\/enthec.com\/wp-content\/uploads\/2026\/03\/Copia-de-Diseno-sin-titulo-6.png","articleSection":["Descargables"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/enthec.com\/en\/cyber-threat-intelligence\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/enthec.com\/en\/cyber-threat-intelligence\/","url":"https:\/\/enthec.com\/en\/cyber-threat-intelligence\/","name":"Cyber Threat Intelligence - ENTHEC \u00b7 Kartos \u00b7 Qondar","isPartOf":{"@id":"https:\/\/enthec.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/enthec.com\/en\/cyber-threat-intelligence\/#primaryimage"},"image":{"@id":"https:\/\/enthec.com\/en\/cyber-threat-intelligence\/#primaryimage"},"thumbnailUrl":"https:\/\/enthec.com\/wp-content\/uploads\/2026\/03\/Copia-de-Diseno-sin-titulo-6.png","datePublished":"2026-03-03T08:15:35+00:00","dateModified":"2026-03-04T09:15:26+00:00","breadcrumb":{"@id":"https:\/\/enthec.com\/en\/cyber-threat-intelligence\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/enthec.com\/en\/cyber-threat-intelligence\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/enthec.com\/en\/cyber-threat-intelligence\/#primaryimage","url":"https:\/\/enthec.com\/wp-content\/uploads\/2026\/03\/Copia-de-Diseno-sin-titulo-6.png","contentUrl":"https:\/\/enthec.com\/wp-content\/uploads\/2026\/03\/Copia-de-Diseno-sin-titulo-6.png","width":1350,"height":1350},{"@type":"BreadcrumbList","@id":"https:\/\/enthec.com\/en\/cyber-threat-intelligence\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Portada","item":"https:\/\/enthec.com\/en\/"},{"@type":"ListItem","position":2,"name":"Cyber Threat Intelligence"}]},{"@type":"WebSite","@id":"https:\/\/enthec.com\/#website","url":"https:\/\/enthec.com\/","name":"ENTHEC","description":"Advanced AI-driven Cyber-Surveillance Platform","publisher":{"@id":"https:\/\/enthec.com\/#organization"},"alternateName":"ENTHEC \u00b7 Kartos \u00b7 Qondar","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/enthec.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/enthec.com\/#organization","name":"ENTHEC","alternateName":"ENTHEC \u00b7 Kartos \u00b7 Qondar","url":"https:\/\/enthec.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/enthec.com\/#\/schema\/logo\/image\/","url":"https:\/\/enthec.com\/wp-content\/uploads\/2024\/08\/Fondo-blanco_1.png","contentUrl":"https:\/\/enthec.com\/wp-content\/uploads\/2024\/08\/Fondo-blanco_1.png","width":667,"height":131,"caption":"ENTHEC"},"image":{"@id":"https:\/\/enthec.com\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/enthec.com\/#\/schema\/person\/ca39e450d4d09a7a39995a9b0a27bfe2","name":"Patricia Hernandez","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/c651156a56ce73c21e2176bf26f824075ecff236092c7046a60b650fa25eeef5?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/c651156a56ce73c21e2176bf26f824075ecff236092c7046a60b650fa25eeef5?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/c651156a56ce73c21e2176bf26f824075ecff236092c7046a60b650fa25eeef5?s=96&d=mm&r=g","caption":"Patricia Hernandez"},"url":"https:\/\/enthec.com\/en\/author\/phernandez\/"}]}},"_links":{"self":[{"href":"https:\/\/enthec.com\/en\/wp-json\/wp\/v2\/posts\/4965","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/enthec.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/enthec.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/enthec.com\/en\/wp-json\/wp\/v2\/users\/11"}],"replies":[{"embeddable":true,"href":"https:\/\/enthec.com\/en\/wp-json\/wp\/v2\/comments?post=4965"}],"version-history":[{"count":2,"href":"https:\/\/enthec.com\/en\/wp-json\/wp\/v2\/posts\/4965\/revisions"}],"predecessor-version":[{"id":4994,"href":"https:\/\/enthec.com\/en\/wp-json\/wp\/v2\/posts\/4965\/revisions\/4994"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/enthec.com\/en\/wp-json\/wp\/v2\/media\/4889"}],"wp:attachment":[{"href":"https:\/\/enthec.com\/en\/wp-json\/wp\/v2\/media?parent=4965"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/enthec.com\/en\/wp-json\/wp\/v2\/categories?post=4965"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/enthec.com\/en\/wp-json\/wp\/v2\/tags?post=4965"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}