What is it?

threat intelligence acquired from public sources, including:

  • community maintained sources
  • government maintained sources
  • vendor maintained sources
  • non-profit sources

Why is it mentioned?

these data sources have multiple ingested streams, from people, devices and other systems. They contain valuable threat intelligence.