1. Online

Intelligence sharing fails when treated primarily as a technical matter. Threat intelligence consists of more than technical data. Business needs and comparative advantage in producing, consuming, and sharing should drive the process. Further, the relative value of intelligence changes depending on the situation. Changing assumptions will allow threat intelligence to live up to its promise.