{"id":7112,"date":"2024-04-10T16:40:13","date_gmt":"2024-04-10T14:40:13","guid":{"rendered":"https:\/\/mascalagrimas.es\/dev-enthec_old\/?p=7112"},"modified":"2024-04-22T09:23:56","modified_gmt":"2024-04-22T07:23:56","slug":"cyber-intelligence-what-it-is","status":"publish","type":"post","link":"https:\/\/mascalagrimas.es\/dev-enthec_old\/en\/cyber-intelligence-what-it-is\/","title":{"rendered":"Cyber-intelligence: what it is and what are its advantages of use at a strategic and tactical level"},"content":{"rendered":"<h1 style=\"text-align: center;\"><b>Cyber-intelligence: what it is and what are its advantages of use at a strategic and tactical level<\/b><\/h1>\n<p>&nbsp;<\/p>\n<p><i><span style=\"font-weight: 400;\">Cyber-intelligence is an emerging and ever-evolving field <\/span><\/i><b><i>that combines elements of traditional intelligence with information technology <\/i><\/b><i><span style=\"font-weight: 400;\">to protect digital operations.<\/span><\/i><\/p>\n<p>&nbsp;<\/p>\n<h2><b>What is Cyber-intelligence?<\/b><\/h2>\n<p><b>Cyber-intelligence is the collection and analysis of information on threats and vulnerabilities <\/b> <span style=\"font-weight: 400;\">in<\/span> <span style=\"font-weight: 400;\">cyberspace that can affect organizations, administrations, and governments.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Its main objective is to provide a <\/span> <b>detailed understanding of the threats faced by these entities and countries, <\/b> <span style=\"font-weight: 400;\">enabling informed decision-making about protecting their digital assets.<\/span><span style=\"font-weight: 400;\"><br \/>\n<\/span><span style=\"font-weight: 400;\"><br \/>\n<\/span><span style=\"font-weight: 400;\">To understand what Cyber-intelligence is, it is necessary to <\/span> <b>know that it focuses on detecting and identifying potential threats<\/b> <span style=\"font-weight: 400;\">before they materialize, allowing organizations to prepare and defend proactively.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">This can include <\/span> <b>identifying threat actors, their tactics, techniques, and procedures, <\/b> <span style=\"font-weight: 400;\">and open and exposed corporate vulnerabilities that they could exploit to carry out an attack successfully.<\/span><span style=\"font-weight: 400;\"><br \/>\n<\/span><span style=\"font-weight: 400;\"><br \/>\n<\/span><span style=\"font-weight: 400;\">It is essential to understand that Cyber-intelligence is not only about<\/span> <b>collecting data, analyzing it, and transforming it into valuable information <\/b> <span style=\"font-weight: 400;\">to face the detected threats.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">It requires <\/span> <b>data analysis capabilities <\/b> <span style=\"font-weight: 400;\">and involves creating a feedback loop in which threat information is continuously used to improve an organization&#8217;s defenses.<\/span><\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"size-medium wp-image-7105 aligncenter\" src=\"https:\/\/mascalagrimas.es\/dev-enthec_old\/wp-content\/uploads\/2024\/04\/que-es-ciberinteligencia-300x300.jpg\" alt=\"What is Cyber-intelligence\" width=\"300\" height=\"300\"><\/p>\n<p>&nbsp;<\/p>\n<h2><b>Main Applications of Cyber-intelligence<\/b><\/h2>\n<p><span style=\"font-weight: 400;\">Cyber-Intelligence has <\/span> <b>many practical applications <\/b> <span style=\"font-weight: 400;\">within an organization&#8217;s cybersecurity strategy.<\/span><\/p>\n<h3><b>Brand Protection<\/b><\/h3>\n<p><span style=\"font-weight: 400;\">Brands, with their reputations, are among <\/span> <b>an organization&#8217;s most valuable assets <\/b> <span style=\"font-weight: 400;\">and, therefore, one of the most targeted by cybercrime.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Cyber-intelligence tools currently offer <\/span> <b>the best strategy for protecting the brand <\/b> <span style=\"font-weight: 400;\">against fraudulent use or abuse.<\/span><\/p>\n<h3><b>Third-party risk<\/b><\/h3>\n<p><span style=\"font-weight: 400;\">In an environment where the IT perimeter has blurred its boundaries in favor of hyperconnection,<\/span><b> controlling the risk of the value chain<\/b><span style=\"font-weight: 400;\"> has ceased to be a voluntary protection strategy. It has become an obligation established by the most advanced legislation, such as the European NIS 2 Directive.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Cyber-intelligence tools allow organizations to control <\/span> <a href=\"https:\/\/mascalagrimas.es\/dev-enthec_old\/el-riesgo-de-terceros-para-las-organizaciones\/\"><span style=\"font-weight: 400;\">third-party risk <\/span><\/a> <span style=\"font-weight: 400;\">through<\/span> <b>objective data obtained in real-time and in a nonintrusive manner,<\/b> <span style=\"font-weight: 400;\">so obtaining permission from third parties is unnecessary.<\/span><\/p>\n<h3><b>Detecting and disabling phishing, fraud, and scam campaigns<\/b><\/h3>\n<p><span style=\"font-weight: 400;\">Raising awareness among customers, employees, and third parties about phishing, fraud, and scams cannot be an organization&#8217;s only strategy to fight them. Organizations must <\/span><b>actively protect all these actors <\/b><span style=\"font-weight: 400;\">for safety and their brand&#8217;s reputation.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Through Cyber-intelligence, organizations can<\/span> <b>locate, track, and deactivate phishing, fraud, and scams<\/b> <span style=\"font-weight: 400;\">with corporate identity theft on social networks.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">You may be interested in our post\u2192<\/span> <a href=\"https:\/\/mascalagrimas.es\/dev-enthec_old\/phishing-que-es-y-cuantos-tipos-hay\/\"><span style=\"font-weight: 400;\">Phishing: what it is and how many types there are<\/span><\/a><span style=\"font-weight: 400;\">.<\/span><\/p>\n<h3><b>Compliance<\/b><\/h3>\n<p><span style=\"font-weight: 400;\">Legal systems are becoming<\/span> <b>stricter regarding organizations&#8217; compliance<\/b> <span style=\"font-weight: 400;\">with protecting the personal and sensitive data they handle and controlling the risk of third parties.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Cyber-intelligence tools allow not only control of the value chain but also<\/span> <b>detect in real-time the leak and exposure of any organization&#8217;s database<\/b> <span style=\"font-weight: 400;\">and open vulnerabilities that may imply a legal sanction.<\/span> <\/p>\n<h3><b>Detection and removal of open and exposed vulnerabilities<\/b><\/h3>\n<p><span style=\"font-weight: 400;\">Open and exposed vulnerabilities on the Internet, the Dark Web, the Deep Web, and Social Networks are within anyone&#8217;s reach and are<\/span> <b>exploited by cybercriminals to design attacks.<\/b><\/p>\n<p><span style=\"font-weight: 400;\">The time the vulnerability remains open plays into<\/span> <b>the attack&#8217;s success.<\/b><span style=\"font-weight: 400;\">. Cyber-intelligence tools enable the organization to detect them almost as soon as they occur.<\/span><\/p>\n<h3><b>Locating Leaked Passwords and Credentials<\/b><\/h3>\n<p>T<span style=\"font-weight: 400;\">he organization&#8217;s knowledge of leaked passwords and credentials and its real-time location allow it to<\/span> <b>change them before they can be used to execute an attack.<\/b><\/p>\n<h3><b>Locating Leaked and Exposed Corporate Databases<\/b><\/h3>\n<p><span style=\"font-weight: 400;\">Cyber-intelligence tools allow the organization to<\/span> <b>detect the leak of any database in real-time<\/b> <span style=\"font-weight: 400;\">and to act quickly to avoid sanctions and damage to corporate reputation.<\/span><\/p>\n<h3><b>Protection of intellectual and industrial property<\/b><\/h3>\n<p><span style=\"font-weight: 400;\">The detection of the<\/span> <b>unauthorized use of resources<\/b> <span style=\"font-weight: 400;\">over which the organization has intellectual or industrial property is essential to protect the corporate core&#8217;s assets<em>.<\/em><\/span><\/p>\n<p><span style=\"font-weight: 400;\">With Cyber-intelligence tools,<\/span> <b>this fraudulent use can be detected in real-time, and the mechanisms to report and eliminate it can be activated.<\/b><\/p>\n<h3><b>Cybersecurity Scoring<\/b><\/h3>\n<p><span style=\"font-weight: 400;\">The most complete Cyber-intelligence tools allow you to <\/span><b>obtain cybersecurity scores<\/b>, <span style=\"font-weight: 400;\">both your own and those of third parties, through objective and up-to-date data.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">This capability<\/span> <b>facilitates decision-making in alliances and cooperations,<\/b> <span style=\"font-weight: 400;\">positioning in contracts with the administration or with other agents, and detecting weak points in the cybersecurity strategy.<\/span><\/p>\n<p>&nbsp;<\/p>\n<h2><b>The Three Types of Cyber-intelligence: Tactical, Strategic, and Technical<\/b><\/h2>\n<p><span style=\"font-weight: 400;\">Among the different types of Cyber-intelligence, we can find three main ones:<\/span><\/p>\n<h3><b>Tactical Cyber-intelligence<\/b><\/h3>\n<p><span style=\"font-weight: 400;\">This type of Cyber-intelligence focuses on<\/span> <b>immediate threats.<\/b><span style=\"font-weight: 400;\">. It includes identifying specific threat actors, understanding their tactics, techniques, and procedures, and detecting ongoing attacks.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Tactical Cyber-intelligence is<\/span> <b>essential for incident response and threat mitigation.<\/b><\/p>\n<h3><b>Strategic Cyber-intelligence<\/b><\/h3>\n<p><span style=\"font-weight: 400;\">Strategic Cyber-intelligence deals with<\/span> l<b>ong-term trends and emerging threats.<\/b><span style=\"font-weight: 400;\">. It includes analyzing cybercriminals&#8217; tactics, identifying new vulnerabilities, and understanding how the threat landscape will evolve.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Strategic Cyber-intelligence is<\/span> <b>crucial for security planning and decision-making at the organizational level<\/b><span style=\"font-weight: 400;\">.<\/span><\/p>\n<h3><b>Technical Cyber-intelligence<\/b><\/h3>\n<p><span style=\"font-weight: 400;\">Technical Cyber-intelligence involves the<\/span> <b>detailed analysis of technical data related to cyber threats.<\/b><span style=\"font-weight: 400;\">. It includes analyzing malware, identifying indicators of compromise, and understanding how attacks are carried out.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Technical Cyber-intelligence is<\/span> <b>essential for network defense and the protection of digital assets<\/b><span style=\"font-weight: 400;\">.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Each type of Cyber-intelligence plays a crucial role in<\/span> <b>protecting organizations against threats.<\/b><span style=\"font-weight: 400;\">. Together, they provide a complete view of risks, enabling organizations to protect themselves in the digital environment effectively.<\/span><\/p>\n<p style=\"text-align: center;\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-medium wp-image-7107\" src=\"https:\/\/mascalagrimas.es\/dev-enthec_old\/wp-content\/uploads\/2024\/04\/principales-tipos-ciberinteligencia-300x199.jpg\" alt=\"main types of cyber-intelligence\" width=\"300\" height=\"199\"><\/p>\n<p>&nbsp;<\/p>\n<h2><b>Advantages of using Cyber-intelligence at a strategic and tactical level<\/b><b><\/b><\/h2>\n<p><span style=\"font-weight: 400;\">On a strategic and tactical level, implementing a Cyber-intelligence tool offers several<\/span> <b>advantages to organizations:<\/b><\/p>\n<ul>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>Cyber Threat Prevention:<\/b><span style=\"font-weight: 400;\"> Cyber-intelligence enables organizations to identify and mitigate threats before they can cause harm. This includes identifying threat actors, understanding their tactics, and detecting vulnerabilities that could be exploited.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>Incident response:<\/b><span style=\"font-weight: 400;\"> When a security incident occurs, Cyber-intelligence helps determine what happened, who was responsible, and how it can be prevented in the future. It includes actions such as malware analysis, attack attribution, and identification of indicators of compromise.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>Threat Intelligence:<\/b><span style=\"font-weight: 400;\"> Cyber-intelligence provides valuable insights into emerging threats and security trends. It helps organizations stay one step ahead of cybercriminals and adapt their defenses accordingly.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>Compliance: <\/b><span style=\"font-weight: 400;\">Organizations have compliance requirements that include protecting digital information and susceptible data identified by legal systems. Cyber-intelligence helps organizations comply with these regulations by providing information about the threats and vulnerabilities that need to be addressed.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>Digital Investigation: <\/b><span style=\"font-weight: 400;\">In the case of a digital crime, Cyber-intelligence is used to collect evidence and track criminals. This involves identifying the source of an attack, gathering digital evidence, and assisting in prosecuting criminals.<\/span><\/li>\n<\/ul>\n<h2><\/h2>\n<h2><b>Why do companies need Cyber-intelligence tools?<\/b><b><\/b><\/h2>\n<p><span style=\"font-weight: 400;\">In the digital environment<\/span> <b>cyber threats are a constant reality that is increasingly difficult to contain<\/b> <span style=\"font-weight: 400;\">due to the incorporation of new technologies into attack planning and execution.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Businesses of all sizes and industries are potential targets for cybercriminals. Cyber-intelligence tools <\/span><b>allow them to use those same new technologies to take a proactive approach to cybersecurity and stay ahead of attacks<\/b>, <span style=\"font-weight: 400;\">neutralizing them before they materialize.<\/span><span style=\"font-weight: 400;\"><br \/>\n<\/span><\/p>\n<ul>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>Proactive threat prevention<\/b><span style=\"font-weight: 400;\"> Cyber-intelligence enables organizations to identify and mitigate threats before they can cause harm. This is especially useful at the tactical level, where early threat identification can prevent attacks and minimize damage.<\/span><\/li>\n<\/ul>\n<ul>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>Informed decision-making:<\/b><span style=\"font-weight: 400;\"> At a strategic level, Cyber-intelligence provides organizations with the information they need to make informed decisions about protecting their digital assets. This includes identifying new vulnerabilities, understanding cybercriminals&#8217; tactics, and anticipating emerging threats.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>Effective Incident Response:<\/b><span style=\"font-weight: 400;\"> Cyber-intelligence helps organizations respond more effectively to security incidents. It provides information that allows the identification of an attack&#8217;s source, the determination of its scope, and the implementation of measures to prevent future incidents.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>Compliance:<\/b> <span style=\"font-weight: 400;\">Cyber-intelligence helps organizations comply with<\/span> <a href=\"https:\/\/mascalagrimas.es\/dev-enthec_old\/buenas-practicas-seguridad-informacion\/\"><span style=\"font-weight: 400;\">information security<\/span><\/a> <span style=\"font-weight: 400;\">regulations by providing information about the threats and vulnerabilities that can lead to a legal breach.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>Improved cybersecurity strategy:<\/b> <span style=\"font-weight: 400;\">By providing a comprehensive view of threats, Cyber-intelligence enables organizations to improve their security posture and protect themselves more effectively in the digital environment.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>Cost savings:<\/b><span style=\"font-weight: 400;\"> Security breaches are costly in terms of direct financial loss and damage to a company&#8217;s reputation. By preventing these breaches, Cyber-intelligence tools prevent the business&#8217;s IT risk.<\/span><\/li>\n<li aria-level=\"1\">\n<\/li>\n<\/ul>\n<h2><b>Get to know our Cyber-intelligence solution for companies<\/b><\/h2>\n<p><a href=\"https:\/\/mascalagrimas.es\/dev-enthec_old\/kartos-xti\/\"><span style=\"font-weight: 400;\">Kartos XTI Watchbots,<\/span><\/a> <span style=\"font-weight: 400;\">the Cyber-intelligence platform for enterprises developed by<\/span> <a href=\"https:\/\/mascalagrimas.es\/dev-enthec_old\/\"><span style=\"font-weight: 400;\">Enthec<\/span><\/a>, <span style=\"font-weight: 400;\">provides organizations with the<\/span> <b>most evolved Cyber-intelligence capabilities on the market<\/b><span style=\"font-weight: 400;\">.<\/span><\/p>\n<p><b>Kartos obtains data on open and exposed vulnerabilities<\/b>, <span style=\"font-weight: 400;\">issues real-time alarms, and issues reports, thanks to Artificial Intelligence developed in-house,<\/span> <span style=\"font-weight: 400;\">in an automated and continuous manner.<\/span><\/p>\n<p>An AI so evolved allows Kartos to be <strong>the only Cyber-intelligence platform for companies capable of eliminating false positives<\/strong> in search results.<\/p>\n<p><a href=\"https:\/\/mascalagrimas.es\/dev-enthec_old\/contacto\/\">Contact us<\/a> if you need more information on how Kartos can protect your business.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Cyberintelligence combines elements of traditional intelligence with information technology to protect organizations in the digital environment.<\/p>\n","protected":false},"author":4,"featured_media":7118,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_et_pb_use_builder":"","_et_pb_old_content":"","_et_gb_content_width":"","footnotes":""},"categories":[69],"tags":[70],"class_list":["post-7112","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cyber-intelligence","tag-cyber-intelligence"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v23.6 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>What is Cyber-intelligence? - Enthec<\/title>\n<meta name=\"description\" content=\"Find out what Cyber-intelligence is and its advantages at strategic and tactical levels. \u261d We&#039;ll tell you all about it here\" \/>\n<meta name=\"robots\" content=\"noindex, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"What is Cyber-intelligence? - Enthec\" \/>\n<meta property=\"og:description\" content=\"Find out what Cyber-intelligence is and its advantages at strategic and tactical levels. \u261d We&#039;ll tell you all about it here\" \/>\n<meta property=\"og:url\" content=\"https:\/\/mascalagrimas.es\/dev-enthec_old\/en\/cyber-intelligence-what-it-is\/\" \/>\n<meta property=\"og:site_name\" content=\"Enthec\" \/>\n<meta property=\"article:published_time\" content=\"2024-04-10T14:40:13+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-04-22T07:23:56+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/mascalagrimas.es\/dev-enthec_old\/wp-content\/uploads\/2024\/04\/Ciberinteligencia-scaled.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"2048\" \/>\n\t<meta property=\"og:image:height\" content=\"1706\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"amorena\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"amorena\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"8 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/mascalagrimas.es\/dev-enthec_old\/en\/cyber-intelligence-what-it-is\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/mascalagrimas.es\/dev-enthec_old\/en\/cyber-intelligence-what-it-is\/\"},\"author\":{\"name\":\"amorena\",\"@id\":\"https:\/\/mascalagrimas.es\/dev-enthec_old\/en\/#\/schema\/person\/fd44f5e93825eeafe172152d8bbf4661\"},\"headline\":\"Cyber-intelligence: what it is and what are its advantages of use at a strategic and tactical level\",\"datePublished\":\"2024-04-10T14:40:13+00:00\",\"dateModified\":\"2024-04-22T07:23:56+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/mascalagrimas.es\/dev-enthec_old\/en\/cyber-intelligence-what-it-is\/\"},\"wordCount\":1433,\"publisher\":{\"@id\":\"https:\/\/mascalagrimas.es\/dev-enthec_old\/en\/#organization\"},\"image\":{\"@id\":\"https:\/\/mascalagrimas.es\/dev-enthec_old\/en\/cyber-intelligence-what-it-is\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/mascalagrimas.es\/dev-enthec_old\/wp-content\/uploads\/2024\/04\/Ciberinteligencia-scaled.jpg\",\"keywords\":[\"Cyber-intelligence\"],\"articleSection\":[\"Cyber-intelligence\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/mascalagrimas.es\/dev-enthec_old\/en\/cyber-intelligence-what-it-is\/\",\"url\":\"https:\/\/mascalagrimas.es\/dev-enthec_old\/en\/cyber-intelligence-what-it-is\/\",\"name\":\"What is Cyber-intelligence? - Enthec\",\"isPartOf\":{\"@id\":\"https:\/\/mascalagrimas.es\/dev-enthec_old\/en\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/mascalagrimas.es\/dev-enthec_old\/en\/cyber-intelligence-what-it-is\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/mascalagrimas.es\/dev-enthec_old\/en\/cyber-intelligence-what-it-is\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/mascalagrimas.es\/dev-enthec_old\/wp-content\/uploads\/2024\/04\/Ciberinteligencia-scaled.jpg\",\"datePublished\":\"2024-04-10T14:40:13+00:00\",\"dateModified\":\"2024-04-22T07:23:56+00:00\",\"description\":\"Find out what Cyber-intelligence is and its advantages at strategic and tactical levels. \u261d We'll tell you all about it here\",\"breadcrumb\":{\"@id\":\"https:\/\/mascalagrimas.es\/dev-enthec_old\/en\/cyber-intelligence-what-it-is\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/mascalagrimas.es\/dev-enthec_old\/en\/cyber-intelligence-what-it-is\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/mascalagrimas.es\/dev-enthec_old\/en\/cyber-intelligence-what-it-is\/#primaryimage\",\"url\":\"https:\/\/mascalagrimas.es\/dev-enthec_old\/wp-content\/uploads\/2024\/04\/Ciberinteligencia-scaled.jpg\",\"contentUrl\":\"https:\/\/mascalagrimas.es\/dev-enthec_old\/wp-content\/uploads\/2024\/04\/Ciberinteligencia-scaled.jpg\",\"width\":2048,\"height\":1706,\"caption\":\"3D render of a modern technology background with connecting lines and dots\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/mascalagrimas.es\/dev-enthec_old\/en\/cyber-intelligence-what-it-is\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/mascalagrimas.es\/dev-enthec_old\/en\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Cyber-intelligence: what it is and what are its advantages of use at a strategic and tactical level\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/mascalagrimas.es\/dev-enthec_old\/en\/#website\",\"url\":\"https:\/\/mascalagrimas.es\/dev-enthec_old\/en\/\",\"name\":\"Enthec\",\"description\":\"La plataforma XTI automatizada\",\"publisher\":{\"@id\":\"https:\/\/mascalagrimas.es\/dev-enthec_old\/en\/#organization\"},\"alternateName\":\"Kartos by Enthec\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/mascalagrimas.es\/dev-enthec_old\/en\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/mascalagrimas.es\/dev-enthec_old\/en\/#organization\",\"name\":\"Enthec\",\"alternateName\":\"Kartos by Enthec\u00e7\",\"url\":\"https:\/\/mascalagrimas.es\/dev-enthec_old\/en\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/mascalagrimas.es\/dev-enthec_old\/en\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/mascalagrimas.es\/dev-enthec_old\/wp-content\/uploads\/2023\/09\/cropped-Mesa-de-trabajo-2-copia-5-1.png\",\"contentUrl\":\"https:\/\/mascalagrimas.es\/dev-enthec_old\/wp-content\/uploads\/2023\/09\/cropped-Mesa-de-trabajo-2-copia-5-1.png\",\"width\":512,\"height\":512,\"caption\":\"Enthec\"},\"image\":{\"@id\":\"https:\/\/mascalagrimas.es\/dev-enthec_old\/en\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/mascalagrimas.es\/dev-enthec_old\/en\/#\/schema\/person\/fd44f5e93825eeafe172152d8bbf4661\",\"name\":\"amorena\",\"url\":\"https:\/\/mascalagrimas.es\/dev-enthec_old\/en\/author\/amorena\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"What is Cyber-intelligence? - Enthec","description":"Find out what Cyber-intelligence is and its advantages at strategic and tactical levels. \u261d We'll tell you all about it here","robots":{"index":"noindex","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"og_locale":"en_US","og_type":"article","og_title":"What is Cyber-intelligence? - Enthec","og_description":"Find out what Cyber-intelligence is and its advantages at strategic and tactical levels. \u261d We'll tell you all about it here","og_url":"https:\/\/mascalagrimas.es\/dev-enthec_old\/en\/cyber-intelligence-what-it-is\/","og_site_name":"Enthec","article_published_time":"2024-04-10T14:40:13+00:00","article_modified_time":"2024-04-22T07:23:56+00:00","og_image":[{"width":2048,"height":1706,"url":"https:\/\/mascalagrimas.es\/dev-enthec_old\/wp-content\/uploads\/2024\/04\/Ciberinteligencia-scaled.jpg","type":"image\/jpeg"}],"author":"amorena","twitter_card":"summary_large_image","twitter_misc":{"Written by":"amorena","Est. reading time":"8 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/mascalagrimas.es\/dev-enthec_old\/en\/cyber-intelligence-what-it-is\/#article","isPartOf":{"@id":"https:\/\/mascalagrimas.es\/dev-enthec_old\/en\/cyber-intelligence-what-it-is\/"},"author":{"name":"amorena","@id":"https:\/\/mascalagrimas.es\/dev-enthec_old\/en\/#\/schema\/person\/fd44f5e93825eeafe172152d8bbf4661"},"headline":"Cyber-intelligence: what it is and what are its advantages of use at a strategic and tactical level","datePublished":"2024-04-10T14:40:13+00:00","dateModified":"2024-04-22T07:23:56+00:00","mainEntityOfPage":{"@id":"https:\/\/mascalagrimas.es\/dev-enthec_old\/en\/cyber-intelligence-what-it-is\/"},"wordCount":1433,"publisher":{"@id":"https:\/\/mascalagrimas.es\/dev-enthec_old\/en\/#organization"},"image":{"@id":"https:\/\/mascalagrimas.es\/dev-enthec_old\/en\/cyber-intelligence-what-it-is\/#primaryimage"},"thumbnailUrl":"https:\/\/mascalagrimas.es\/dev-enthec_old\/wp-content\/uploads\/2024\/04\/Ciberinteligencia-scaled.jpg","keywords":["Cyber-intelligence"],"articleSection":["Cyber-intelligence"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/mascalagrimas.es\/dev-enthec_old\/en\/cyber-intelligence-what-it-is\/","url":"https:\/\/mascalagrimas.es\/dev-enthec_old\/en\/cyber-intelligence-what-it-is\/","name":"What is Cyber-intelligence? - Enthec","isPartOf":{"@id":"https:\/\/mascalagrimas.es\/dev-enthec_old\/en\/#website"},"primaryImageOfPage":{"@id":"https:\/\/mascalagrimas.es\/dev-enthec_old\/en\/cyber-intelligence-what-it-is\/#primaryimage"},"image":{"@id":"https:\/\/mascalagrimas.es\/dev-enthec_old\/en\/cyber-intelligence-what-it-is\/#primaryimage"},"thumbnailUrl":"https:\/\/mascalagrimas.es\/dev-enthec_old\/wp-content\/uploads\/2024\/04\/Ciberinteligencia-scaled.jpg","datePublished":"2024-04-10T14:40:13+00:00","dateModified":"2024-04-22T07:23:56+00:00","description":"Find out what Cyber-intelligence is and its advantages at strategic and tactical levels. \u261d We'll tell you all about it here","breadcrumb":{"@id":"https:\/\/mascalagrimas.es\/dev-enthec_old\/en\/cyber-intelligence-what-it-is\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/mascalagrimas.es\/dev-enthec_old\/en\/cyber-intelligence-what-it-is\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/mascalagrimas.es\/dev-enthec_old\/en\/cyber-intelligence-what-it-is\/#primaryimage","url":"https:\/\/mascalagrimas.es\/dev-enthec_old\/wp-content\/uploads\/2024\/04\/Ciberinteligencia-scaled.jpg","contentUrl":"https:\/\/mascalagrimas.es\/dev-enthec_old\/wp-content\/uploads\/2024\/04\/Ciberinteligencia-scaled.jpg","width":2048,"height":1706,"caption":"3D render of a modern technology background with connecting lines and dots"},{"@type":"BreadcrumbList","@id":"https:\/\/mascalagrimas.es\/dev-enthec_old\/en\/cyber-intelligence-what-it-is\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/mascalagrimas.es\/dev-enthec_old\/en\/"},{"@type":"ListItem","position":2,"name":"Cyber-intelligence: what it is and what are its advantages of use at a strategic and tactical level"}]},{"@type":"WebSite","@id":"https:\/\/mascalagrimas.es\/dev-enthec_old\/en\/#website","url":"https:\/\/mascalagrimas.es\/dev-enthec_old\/en\/","name":"Enthec","description":"La plataforma XTI automatizada","publisher":{"@id":"https:\/\/mascalagrimas.es\/dev-enthec_old\/en\/#organization"},"alternateName":"Kartos by Enthec","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/mascalagrimas.es\/dev-enthec_old\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/mascalagrimas.es\/dev-enthec_old\/en\/#organization","name":"Enthec","alternateName":"Kartos by Enthec\u00e7","url":"https:\/\/mascalagrimas.es\/dev-enthec_old\/en\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/mascalagrimas.es\/dev-enthec_old\/en\/#\/schema\/logo\/image\/","url":"https:\/\/mascalagrimas.es\/dev-enthec_old\/wp-content\/uploads\/2023\/09\/cropped-Mesa-de-trabajo-2-copia-5-1.png","contentUrl":"https:\/\/mascalagrimas.es\/dev-enthec_old\/wp-content\/uploads\/2023\/09\/cropped-Mesa-de-trabajo-2-copia-5-1.png","width":512,"height":512,"caption":"Enthec"},"image":{"@id":"https:\/\/mascalagrimas.es\/dev-enthec_old\/en\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/mascalagrimas.es\/dev-enthec_old\/en\/#\/schema\/person\/fd44f5e93825eeafe172152d8bbf4661","name":"amorena","url":"https:\/\/mascalagrimas.es\/dev-enthec_old\/en\/author\/amorena\/"}]}},"_links":{"self":[{"href":"https:\/\/mascalagrimas.es\/dev-enthec_old\/en\/wp-json\/wp\/v2\/posts\/7112","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/mascalagrimas.es\/dev-enthec_old\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/mascalagrimas.es\/dev-enthec_old\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/mascalagrimas.es\/dev-enthec_old\/en\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/mascalagrimas.es\/dev-enthec_old\/en\/wp-json\/wp\/v2\/comments?post=7112"}],"version-history":[{"count":7,"href":"https:\/\/mascalagrimas.es\/dev-enthec_old\/en\/wp-json\/wp\/v2\/posts\/7112\/revisions"}],"predecessor-version":[{"id":7133,"href":"https:\/\/mascalagrimas.es\/dev-enthec_old\/en\/wp-json\/wp\/v2\/posts\/7112\/revisions\/7133"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/mascalagrimas.es\/dev-enthec_old\/en\/wp-json\/wp\/v2\/media\/7118"}],"wp:attachment":[{"href":"https:\/\/mascalagrimas.es\/dev-enthec_old\/en\/wp-json\/wp\/v2\/media?parent=7112"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/mascalagrimas.es\/dev-enthec_old\/en\/wp-json\/wp\/v2\/categories?post=7112"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/mascalagrimas.es\/dev-enthec_old\/en\/wp-json\/wp\/v2\/tags?post=7112"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}