{"id":1388,"date":"2023-09-04T00:10:50","date_gmt":"2023-09-04T00:10:50","guid":{"rendered":"https:\/\/cyberthreatintelligencenetwork.com\/?p=1388"},"modified":"2024-04-29T10:36:02","modified_gmt":"2024-04-29T10:36:02","slug":"charting-a-new-course-for-military-cyber-threat-intelligence-through-structured-standards-and-protocols","status":"publish","type":"post","link":"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/2023\/09\/04\/charting-a-new-course-for-military-cyber-threat-intelligence-through-structured-standards-and-protocols\/","title":{"rendered":"Charting a New Course for Military Cyber Threat Intelligence"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"1388\" class=\"elementor elementor-1388\" data-elementor-post-type=\"post\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-6e55946 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"6e55946\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-5875ac4\" data-id=\"5875ac4\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap\">\n\t\t\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t<div class=\"elementor-element elementor-element-099cbe5 e-flex e-con-boxed e-con e-parent\" data-id=\"099cbe5\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-7f8f236 elementor-widget elementor-widget-text-editor\" data-id=\"7f8f236\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>The rapid advancements in cyber capabilities among nation-states and non-state actors alike have made the cyber domain a principal battleground, requiring military organizations to perpetually adapt and improve their Cyber Threat Intelligence (CTI) frameworks. The convergence of STIX (Structured Threat Information eXpression), TAXII (Trusted Automated eXchange of Indicator Information), and CybOX (Cyber Observable eXpression) offers an unprecedented technological trio that radically redefines the CTI landscape for military applications. These are not merely components that fortify existing defenses; they transform our approach by introducing a nuanced, structured, and interconnected understanding of cyber threats in an inherently fragmented and highly volatile digital space.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-6547a10 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"6547a10\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-e5f5dc6\" data-id=\"e5f5dc6\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-a26775f elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"a26775f\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-33 elementor-inner-column elementor-element elementor-element-7e908ac\" data-id=\"7e908ac\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-f383f9b elementor-widget elementor-widget-text-editor\" data-id=\"f383f9b\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>STIX provides a structured language for articulating complex threat indicators and defining the tactics, techniques, and procedures (TTPs) deployed by adversaries. It brings high levels of granularity to threat modeling, enabling military CTI analysts to distinguish between various threat actors, whether they be nation-states, terrorists, or hacktivist groups. By enabling nuanced classification and risk assessment, STIX helps prioritize defensive and offensive actions.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-66 elementor-inner-column elementor-element elementor-element-8838b39\" data-id=\"8838b39\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-3c5827a elementor-widget elementor-widget-image\" data-id=\"3c5827a\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img fetchpriority=\"high\" decoding=\"async\" width=\"640\" height=\"373\" src=\"data:image\/gif;base64,R0lGODlhAQABAIAAAAAAAP\/\/\/yH5BAEAAAAALAAAAAABAAEAAAIBRAA7\" data-src=\"https:\/\/cyberthreatintelligencenetwork.com\/wp-content\/uploads\/2023\/09\/mapZeroOne-copy.png\" class=\"attachment-medium_large size-medium_large wp-image-1395 lazyload\" alt=\"\" data-srcset=\"https:\/\/cyberthreatintelligencenetwork.com\/wp-content\/uploads\/2023\/09\/mapZeroOne-copy.png 640w, https:\/\/cyberthreatintelligencenetwork.com\/wp-content\/uploads\/2023\/09\/mapZeroOne-copy-300x175.png 300w\" sizes=\"(max-width: 640px) 100vw, 640px\" title=\"mapZeroOne copy - CTIN\" \/><noscript><img decoding=\"async\" width=\"640\" height=\"373\" src=\"https:\/\/cyberthreatintelligencenetwork.com\/wp-content\/uploads\/2023\/09\/mapZeroOne-copy.png\" class=\"attachment-medium_large size-medium_large wp-image-1395 lazyload\" alt=\"\" srcset=\"https:\/\/cyberthreatintelligencenetwork.com\/wp-content\/uploads\/2023\/09\/mapZeroOne-copy.png 640w, https:\/\/cyberthreatintelligencenetwork.com\/wp-content\/uploads\/2023\/09\/mapZeroOne-copy-300x175.png 300w\" sizes=\"(max-width: 640px) 100vw, 640px\" title=\"mapZeroOne copy - CTIN\" \/><\/noscript>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-a0a3e13 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"a0a3e13\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-08da25a\" data-id=\"08da25a\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-1c0d92e elementor-widget elementor-widget-text-editor\" data-id=\"1c0d92e\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>TAXII operates as a robust and secure transport mechanism specifically designed to facilitate the transfer of threat intelligence data. Beyond the mere exchange of threat indicators, TAXII enables a highly automated, real-time, and secure sharing architecture that is compatible with the most stringent military security protocols. It supports the rapid exchange of STIX objects over trusted channels, reducing the time between threat identification and actionable intelligence.<\/p><p>CybOX supplements this with its emphasis on cyber observables, providing detailed descriptions of the configuration items and environmental variables associated with cyber threats. It allows for enhanced cyber situational awareness, capturing details like file attributes, system processes, and network activities. When you integrate CybOX into the equation, you&#8217;re not just getting an understanding of the &#8220;what&#8221; and the &#8220;who&#8221; but also the &#8220;how&#8221; of cyberattacks, down to the most intricate technical specifics.<\/p><p>The synergy between STIX, TAXII, and CybOX shines most brilliantly when we examine their capacities for enabling predictive analytics and anticipatory strategies. By utilizing machine learning algorithms trained on the robust data sets generated by these protocols, military intelligence can create predictive models that proactively identify potential vulnerabilities and threats. This elevates CTI from being a reactionary tool to a proactive strategy mechanism that anticipates and mitigates risks before they evolve into attacks.<\/p><p>Consider the enormous value of this framework in a coalition warfare scenario. The military often collaborates with allies, partners, and various interagency groups. STIX, TAXII, and CybOX&#8217;s standards-based approach ensures that disparate systems can speak a common language, breaking down silos and enhancing the collective defense posture. The shared ontologies mean that one country&#8217;s intelligence can be easily understood, validated, and actioned upon by another, significantly enhancing coalition capabilities against common adversaries.<\/p><p>Operational security and data integrity are, understandably, of paramount concern in military CTI. The trifecta of STIX, TAXII, and CybOX incorporates robust security features that align with military-grade encryption standards, multi-factor authentication, and role-based access controls. This ensures that only authorized personnel can access the sensitive intelligence data, thereby safeguarding it from potential compromise.<\/p><p>When integrated into comprehensive CTI frameworks like DISARM, the potential of STIX, TAXII, and CybOX is fully unleashed, offering a full spectrum solution that ranges from immediate tactical necessities to long-term strategic imperatives. This integration enables a holistic approach to CTI that is both resilient and adaptable, capable of evolving to meet emerging threats and challenges.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t<div class=\"elementor-element elementor-element-07d1df8 e-flex e-con-boxed e-con e-parent\" data-id=\"07d1df8\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-cb037c8 elementor-widget elementor-widget-text-editor\" data-id=\"cb037c8\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><a href=\"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/2023\/09\/04\/charting-a-new-course-for-military-cyber-threat-intelligence-through-structured-standards-and-protocols\/militaryman-ctin-tc-rightsize\/\" rel=\"attachment wp-att-1416\"><img decoding=\"async\" class=\"size-medium wp-image-1416 alignleft lazyload\" src=\"data:image\/gif;base64,R0lGODlhAQABAIAAAAAAAP\/\/\/yH5BAEAAAAALAAAAAABAAEAAAIBRAA7\" data-src=\"https:\/\/cyberthreatintelligencenetwork.com\/wp-content\/uploads\/2023\/09\/MilitaryMan-CTIN-TC-RightSize-300x200.png\" alt=\"Military Man Right Size\" width=\"300\" height=\"200\" \/><noscript><img loading=\"lazy\" decoding=\"async\" class=\"size-medium wp-image-1416 alignleft lazyload\" src=\"https:\/\/cyberthreatintelligencenetwork.com\/wp-content\/uploads\/2023\/09\/MilitaryMan-CTIN-TC-RightSize-300x200.png\" alt=\"Military Man Right Size\" width=\"300\" height=\"200\" srcset=\"https:\/\/cyberthreatintelligencenetwork.com\/wp-content\/uploads\/2023\/09\/MilitaryMan-CTIN-TC-RightSize-300x200.png 300w, https:\/\/cyberthreatintelligencenetwork.com\/wp-content\/uploads\/2023\/09\/MilitaryMan-CTIN-TC-RightSize-1024x683.png 1024w, https:\/\/cyberthreatintelligencenetwork.com\/wp-content\/uploads\/2023\/09\/MilitaryMan-CTIN-TC-RightSize-768x513.png 768w, https:\/\/cyberthreatintelligencenetwork.com\/wp-content\/uploads\/2023\/09\/MilitaryMan-CTIN-TC-RightSize.png 1236w\" sizes=\"(max-width: 300px) 100vw, 300px\" \/><\/noscript><\/a>In conclusion, the coalescence of STIX, TAXII, and CybOX into military CTI frameworks isn&#8217;t merely an upgrade; it&#8217;s a revolution. By providing an ecosystem of interoperable standards and protocols, these tools allow for a more nuanced, effective, and collaborative approach to cyber threat intelligence in the military domain. They lay the foundation for a new era where CTI is not just an add-on to military operations but a core component of a multi-dimensional and dynamic defense strategy, capable of adapting to the rapidly evolving threats in our increasingly interconnected world.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-fc1ff4a e-flex e-con-boxed e-con e-parent\" data-id=\"fc1ff4a\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-8c92aeb e-con-full e-flex e-con e-child\" data-id=\"8c92aeb\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-dd02f15 elementor-widget elementor-widget-text-editor\" data-id=\"dd02f15\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><em>Editors Note:\u00a0 Core compontents of the CybOX enumeration have been incorporated into the STIX2.1 standard as STIX Cyber Observable (SCO) objects.\u00a0\u00a0<\/em><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>The rapid advancements in cyber capabilities among nation-states and non-state actors alike have made the cyber domain a principal battleground, requiring military organizations to perpetually adapt and improve their Cyber Threat Intelligence frameworks.<\/p>\n","protected":false},"author":8,"featured_media":1425,"comment_status":"closed","ping_status":"open","sticky":false,"template":"elementor_theme","format":"standard","meta":{"_exactmetrics_skip_tracking":false,"_exactmetrics_sitenote_active":false,"_exactmetrics_sitenote_note":"","_exactmetrics_sitenote_category":0,"footnotes":""},"categories":[4,330,255],"tags":[1370,18],"class_list":["post-1388","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-intelligence","category-operations","category-stix-taxii","tag-oasis-open","tag-stix2-1"],"aioseo_notices":[],"aioseo_head":"\n\t\t<!-- All in One SEO Pro 4.9.5.2 - aioseo.com -->\n\t<meta name=\"description\" content=\"The rapid advancements in cyber capabilities among nation-states and non-state actors alike have made the cyber domain a principal battleground, requiring military organizations to perpetually adapt and improve their Cyber Threat Intelligence frameworks.\" \/>\n\t<meta name=\"robots\" content=\"max-image-preview:large\" \/>\n\t<meta name=\"author\" content=\"Niels Groenveld\"\/>\n\t<link rel=\"canonical\" href=\"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/2023\/09\/04\/charting-a-new-course-for-military-cyber-threat-intelligence-through-structured-standards-and-protocols\/\" \/>\n\t<meta name=\"generator\" content=\"All in One SEO Pro (AIOSEO) 4.9.5.2\" \/>\n\t\t<meta property=\"og:locale\" content=\"en_US\" \/>\n\t\t<meta property=\"og:site_name\" content=\"CTIN - Cybersecurity Center\" \/>\n\t\t<meta property=\"og:type\" content=\"article\" \/>\n\t\t<meta property=\"og:title\" content=\"Charting a New Course for Military Cyber Threat Intelligence - CTIN\" \/>\n\t\t<meta property=\"og:description\" content=\"The rapid advancements in cyber capabilities among nation-states and non-state actors alike have made the cyber domain a principal battleground, requiring military organizations to perpetually adapt and improve their Cyber Threat Intelligence frameworks.\" \/>\n\t\t<meta property=\"og:url\" content=\"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/2023\/09\/04\/charting-a-new-course-for-military-cyber-threat-intelligence-through-structured-standards-and-protocols\/\" \/>\n\t\t<meta property=\"og:image\" content=\"https:\/\/cyberthreatintelligencenetwork.com\/wp-content\/uploads\/2024\/05\/SocialShare-Image.png\" \/>\n\t\t<meta property=\"og:image:secure_url\" content=\"https:\/\/cyberthreatintelligencenetwork.com\/wp-content\/uploads\/2024\/05\/SocialShare-Image.png\" \/>\n\t\t<meta property=\"og:image:width\" content=\"112\" \/>\n\t\t<meta property=\"og:image:height\" content=\"112\" \/>\n\t\t<meta property=\"article:published_time\" content=\"2023-09-04T00:10:50+00:00\" \/>\n\t\t<meta property=\"article:modified_time\" content=\"2024-04-29T10:36:02+00:00\" \/>\n\t\t<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/CyberThreatIntelligenceNetwork\/\" \/>\n\t\t<meta name=\"twitter:card\" content=\"summary\" \/>\n\t\t<meta name=\"twitter:site\" content=\"@CTIN_Global\" \/>\n\t\t<meta name=\"twitter:title\" content=\"Charting a New Course for Military Cyber Threat Intelligence - CTIN\" \/>\n\t\t<meta name=\"twitter:description\" content=\"The rapid advancements in cyber capabilities among nation-states and non-state actors alike have made the cyber domain a principal battleground, requiring military organizations to perpetually adapt and improve their Cyber Threat Intelligence frameworks.\" \/>\n\t\t<meta name=\"twitter:creator\" content=\"@CTIN_Global\" \/>\n\t\t<meta name=\"twitter:image\" content=\"https:\/\/cyberthreatintelligencenetwork.com\/wp-content\/uploads\/2024\/05\/SocialShare-Image.png\" \/>\n\t\t<script type=\"application\/ld+json\" class=\"aioseo-schema\">\n\t\t\t{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"BlogPosting\",\"@id\":\"https:\\\/\\\/cyberthreatintelligencenetwork.com\\\/index.php\\\/2023\\\/09\\\/04\\\/charting-a-new-course-for-military-cyber-threat-intelligence-through-structured-standards-and-protocols\\\/#blogposting\",\"name\":\"Charting a New Course for Military Cyber Threat Intelligence - CTIN\",\"headline\":\"Charting a New Course for Military Cyber Threat Intelligence\",\"author\":{\"@id\":\"https:\\\/\\\/cyberthreatintelligencenetwork.com\\\/index.php\\\/author\\\/niels-groenveld\\\/#author\"},\"publisher\":{\"@id\":\"https:\\\/\\\/cyberthreatintelligencenetwork.com\\\/#organization\"},\"image\":{\"@type\":\"ImageObject\",\"url\":\"https:\\\/\\\/cyberthreatintelligencenetwork.com\\\/wp-content\\\/uploads\\\/2023\\\/09\\\/Tanks-DigitalImages-RightSize.jpg\",\"width\":1480,\"height\":696},\"datePublished\":\"2023-09-04T00:10:50+00:00\",\"dateModified\":\"2024-04-29T10:36:02+00:00\",\"inLanguage\":\"en-US\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/cyberthreatintelligencenetwork.com\\\/index.php\\\/2023\\\/09\\\/04\\\/charting-a-new-course-for-military-cyber-threat-intelligence-through-structured-standards-and-protocols\\\/#webpage\"},\"isPartOf\":{\"@id\":\"https:\\\/\\\/cyberthreatintelligencenetwork.com\\\/index.php\\\/2023\\\/09\\\/04\\\/charting-a-new-course-for-military-cyber-threat-intelligence-through-structured-standards-and-protocols\\\/#webpage\"},\"articleSection\":\"Intelligence, Operations, STIX\\\/TAXII, OASIS Open, STIX2.1\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/cyberthreatintelligencenetwork.com\\\/index.php\\\/2023\\\/09\\\/04\\\/charting-a-new-course-for-military-cyber-threat-intelligence-through-structured-standards-and-protocols\\\/#breadcrumblist\",\"itemListElement\":[{\"@type\":\"ListItem\",\"@id\":\"https:\\\/\\\/cyberthreatintelligencenetwork.com#listItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/cyberthreatintelligencenetwork.com\",\"nextItem\":{\"@type\":\"ListItem\",\"@id\":\"https:\\\/\\\/cyberthreatintelligencenetwork.com\\\/index.php\\\/blog\\\/posts\\\/#listItem\",\"name\":\"Posts\"}},{\"@type\":\"ListItem\",\"@id\":\"https:\\\/\\\/cyberthreatintelligencenetwork.com\\\/index.php\\\/blog\\\/posts\\\/#listItem\",\"position\":2,\"name\":\"Posts\",\"item\":\"https:\\\/\\\/cyberthreatintelligencenetwork.com\\\/index.php\\\/blog\\\/posts\\\/\",\"nextItem\":{\"@type\":\"ListItem\",\"@id\":\"https:\\\/\\\/cyberthreatintelligencenetwork.com\\\/index.php\\\/category\\\/operations\\\/#listItem\",\"name\":\"Operations\"},\"previousItem\":{\"@type\":\"ListItem\",\"@id\":\"https:\\\/\\\/cyberthreatintelligencenetwork.com#listItem\",\"name\":\"Home\"}},{\"@type\":\"ListItem\",\"@id\":\"https:\\\/\\\/cyberthreatintelligencenetwork.com\\\/index.php\\\/category\\\/operations\\\/#listItem\",\"position\":3,\"name\":\"Operations\",\"item\":\"https:\\\/\\\/cyberthreatintelligencenetwork.com\\\/index.php\\\/category\\\/operations\\\/\",\"nextItem\":{\"@type\":\"ListItem\",\"@id\":\"https:\\\/\\\/cyberthreatintelligencenetwork.com\\\/index.php\\\/2023\\\/09\\\/04\\\/charting-a-new-course-for-military-cyber-threat-intelligence-through-structured-standards-and-protocols\\\/#listItem\",\"name\":\"Charting a New Course for Military Cyber Threat Intelligence\"},\"previousItem\":{\"@type\":\"ListItem\",\"@id\":\"https:\\\/\\\/cyberthreatintelligencenetwork.com\\\/index.php\\\/blog\\\/posts\\\/#listItem\",\"name\":\"Posts\"}},{\"@type\":\"ListItem\",\"@id\":\"https:\\\/\\\/cyberthreatintelligencenetwork.com\\\/index.php\\\/2023\\\/09\\\/04\\\/charting-a-new-course-for-military-cyber-threat-intelligence-through-structured-standards-and-protocols\\\/#listItem\",\"position\":4,\"name\":\"Charting a New Course for Military Cyber Threat Intelligence\",\"previousItem\":{\"@type\":\"ListItem\",\"@id\":\"https:\\\/\\\/cyberthreatintelligencenetwork.com\\\/index.php\\\/category\\\/operations\\\/#listItem\",\"name\":\"Operations\"}}]},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/cyberthreatintelligencenetwork.com\\\/#organization\",\"name\":\"Cyber Threat Intelligence Network\",\"description\":\"Cybersecurity Center\",\"url\":\"https:\\\/\\\/cyberthreatintelligencenetwork.com\\\/\",\"telephone\":\"+14804624039\",\"logo\":{\"@type\":\"ImageObject\",\"url\":\"https:\\\/\\\/cyberthreatintelligencenetwork.com\\\/wp-content\\\/uploads\\\/2021\\\/01\\\/cropped-cropped-2020-logo.png\",\"@id\":\"https:\\\/\\\/cyberthreatintelligencenetwork.com\\\/index.php\\\/2023\\\/09\\\/04\\\/charting-a-new-course-for-military-cyber-threat-intelligence-through-structured-standards-and-protocols\\\/#organizationLogo\",\"width\":757,\"height\":237},\"image\":{\"@id\":\"https:\\\/\\\/cyberthreatintelligencenetwork.com\\\/index.php\\\/2023\\\/09\\\/04\\\/charting-a-new-course-for-military-cyber-threat-intelligence-through-structured-standards-and-protocols\\\/#organizationLogo\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/CyberThreatIntelligenceNetwork\\\/\",\"https:\\\/\\\/twitter.com\\\/CTIN_Global\",\"https:\\\/\\\/www.linkedin.com\\\/in\\\/janeginn\\\/\",\"https:\\\/\\\/bsky.app\\\/profile\\\/janeginn.bsky.social\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/cyberthreatintelligencenetwork.com\\\/index.php\\\/author\\\/niels-groenveld\\\/#author\",\"url\":\"https:\\\/\\\/cyberthreatintelligencenetwork.com\\\/index.php\\\/author\\\/niels-groenveld\\\/\",\"name\":\"Niels Groenveld\",\"image\":{\"@type\":\"ImageObject\",\"url\":\"https:\\\/\\\/cyberthreatintelligencenetwork.com\\\/wp-content\\\/uploads\\\/2023\\\/01\\\/Niels-Headshot-e1674669418534.png\"},\"sameAs\":[\"https:\\\/\\\/www.linkedin.com\\\/in\\\/nielsgroeneveld\\\/\"],\"description\":\"With a strategic role at Brica Business Risk Intelligence, my expertise in cybersecurity and network security has been pivotal in identifying new business opportunities and enhancing our threat intelligence capabilities. At the heart of my professional ethos lies a commitment to safeguarding digital ecosystems and empowering organizations through actionable intelligence.As a member of the EC-Council's Threat Intelligence Advisory Board, I leveraged my vast experience to contribute to the development of industry-leading practices. My tenure at Brica and EC-Council reflects a dedicated pursuit of excellence in cyber threat analysis, underscored by a deep understanding of Maltego and proactive business development strategies.\",\"jobTitle\":\"Intelligence Analyst\",\"alumniOf\":[{\"@type\":\"EducationalOrganization\",\"name\":\"University of Amsterdam\",\"sameAs\":\"https:\\\/\\\/www.linkedin.com\\\/school\\\/university-of-amsterdam\\\/\"}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/cyberthreatintelligencenetwork.com\\\/index.php\\\/2023\\\/09\\\/04\\\/charting-a-new-course-for-military-cyber-threat-intelligence-through-structured-standards-and-protocols\\\/#webpage\",\"url\":\"https:\\\/\\\/cyberthreatintelligencenetwork.com\\\/index.php\\\/2023\\\/09\\\/04\\\/charting-a-new-course-for-military-cyber-threat-intelligence-through-structured-standards-and-protocols\\\/\",\"name\":\"Charting a New Course for Military Cyber Threat Intelligence - CTIN\",\"description\":\"The rapid advancements in cyber capabilities among nation-states and non-state actors alike have made the cyber domain a principal battleground, requiring military organizations to perpetually adapt and improve their Cyber Threat Intelligence frameworks.\",\"inLanguage\":\"en-US\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/cyberthreatintelligencenetwork.com\\\/#website\"},\"breadcrumb\":{\"@id\":\"https:\\\/\\\/cyberthreatintelligencenetwork.com\\\/index.php\\\/2023\\\/09\\\/04\\\/charting-a-new-course-for-military-cyber-threat-intelligence-through-structured-standards-and-protocols\\\/#breadcrumblist\"},\"author\":{\"@id\":\"https:\\\/\\\/cyberthreatintelligencenetwork.com\\\/index.php\\\/author\\\/niels-groenveld\\\/#author\"},\"creator\":{\"@id\":\"https:\\\/\\\/cyberthreatintelligencenetwork.com\\\/index.php\\\/author\\\/niels-groenveld\\\/#author\"},\"image\":{\"@type\":\"ImageObject\",\"url\":\"https:\\\/\\\/cyberthreatintelligencenetwork.com\\\/wp-content\\\/uploads\\\/2023\\\/09\\\/Tanks-DigitalImages-RightSize.jpg\",\"@id\":\"https:\\\/\\\/cyberthreatintelligencenetwork.com\\\/index.php\\\/2023\\\/09\\\/04\\\/charting-a-new-course-for-military-cyber-threat-intelligence-through-structured-standards-and-protocols\\\/#mainImage\",\"width\":1480,\"height\":696},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/cyberthreatintelligencenetwork.com\\\/index.php\\\/2023\\\/09\\\/04\\\/charting-a-new-course-for-military-cyber-threat-intelligence-through-structured-standards-and-protocols\\\/#mainImage\"},\"datePublished\":\"2023-09-04T00:10:50+00:00\",\"dateModified\":\"2024-04-29T10:36:02+00:00\"},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/cyberthreatintelligencenetwork.com\\\/#website\",\"url\":\"https:\\\/\\\/cyberthreatintelligencenetwork.com\\\/\",\"name\":\"Training Center\",\"description\":\"Cybersecurity Center\",\"inLanguage\":\"en-US\",\"publisher\":{\"@id\":\"https:\\\/\\\/cyberthreatintelligencenetwork.com\\\/#organization\"}}]}\n\t\t<\/script>\n\t\t<!-- All in One SEO Pro -->\r\n\t\t<title>Charting a New Course for Military Cyber Threat Intelligence - CTIN<\/title>\n\n","aioseo_head_json":{"title":"Charting a New Course for Military Cyber Threat Intelligence - CTIN","description":"The rapid advancements in cyber capabilities among nation-states and non-state actors alike have made the cyber domain a principal battleground, requiring military organizations to perpetually adapt and improve their Cyber Threat Intelligence frameworks.","canonical_url":"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/2023\/09\/04\/charting-a-new-course-for-military-cyber-threat-intelligence-through-structured-standards-and-protocols\/","robots":"max-image-preview:large","keywords":"","webmasterTools":{"miscellaneous":""},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"BlogPosting","@id":"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/2023\/09\/04\/charting-a-new-course-for-military-cyber-threat-intelligence-through-structured-standards-and-protocols\/#blogposting","name":"Charting a New Course for Military Cyber Threat Intelligence - CTIN","headline":"Charting a New Course for Military Cyber Threat Intelligence","author":{"@id":"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/author\/niels-groenveld\/#author"},"publisher":{"@id":"https:\/\/cyberthreatintelligencenetwork.com\/#organization"},"image":{"@type":"ImageObject","url":"https:\/\/cyberthreatintelligencenetwork.com\/wp-content\/uploads\/2023\/09\/Tanks-DigitalImages-RightSize.jpg","width":1480,"height":696},"datePublished":"2023-09-04T00:10:50+00:00","dateModified":"2024-04-29T10:36:02+00:00","inLanguage":"en-US","mainEntityOfPage":{"@id":"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/2023\/09\/04\/charting-a-new-course-for-military-cyber-threat-intelligence-through-structured-standards-and-protocols\/#webpage"},"isPartOf":{"@id":"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/2023\/09\/04\/charting-a-new-course-for-military-cyber-threat-intelligence-through-structured-standards-and-protocols\/#webpage"},"articleSection":"Intelligence, Operations, STIX\/TAXII, OASIS Open, STIX2.1"},{"@type":"BreadcrumbList","@id":"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/2023\/09\/04\/charting-a-new-course-for-military-cyber-threat-intelligence-through-structured-standards-and-protocols\/#breadcrumblist","itemListElement":[{"@type":"ListItem","@id":"https:\/\/cyberthreatintelligencenetwork.com#listItem","position":1,"name":"Home","item":"https:\/\/cyberthreatintelligencenetwork.com","nextItem":{"@type":"ListItem","@id":"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/blog\/posts\/#listItem","name":"Posts"}},{"@type":"ListItem","@id":"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/blog\/posts\/#listItem","position":2,"name":"Posts","item":"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/blog\/posts\/","nextItem":{"@type":"ListItem","@id":"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/category\/operations\/#listItem","name":"Operations"},"previousItem":{"@type":"ListItem","@id":"https:\/\/cyberthreatintelligencenetwork.com#listItem","name":"Home"}},{"@type":"ListItem","@id":"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/category\/operations\/#listItem","position":3,"name":"Operations","item":"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/category\/operations\/","nextItem":{"@type":"ListItem","@id":"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/2023\/09\/04\/charting-a-new-course-for-military-cyber-threat-intelligence-through-structured-standards-and-protocols\/#listItem","name":"Charting a New Course for Military Cyber Threat Intelligence"},"previousItem":{"@type":"ListItem","@id":"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/blog\/posts\/#listItem","name":"Posts"}},{"@type":"ListItem","@id":"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/2023\/09\/04\/charting-a-new-course-for-military-cyber-threat-intelligence-through-structured-standards-and-protocols\/#listItem","position":4,"name":"Charting a New Course for Military Cyber Threat Intelligence","previousItem":{"@type":"ListItem","@id":"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/category\/operations\/#listItem","name":"Operations"}}]},{"@type":"Organization","@id":"https:\/\/cyberthreatintelligencenetwork.com\/#organization","name":"Cyber Threat Intelligence Network","description":"Cybersecurity Center","url":"https:\/\/cyberthreatintelligencenetwork.com\/","telephone":"+14804624039","logo":{"@type":"ImageObject","url":"https:\/\/cyberthreatintelligencenetwork.com\/wp-content\/uploads\/2021\/01\/cropped-cropped-2020-logo.png","@id":"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/2023\/09\/04\/charting-a-new-course-for-military-cyber-threat-intelligence-through-structured-standards-and-protocols\/#organizationLogo","width":757,"height":237},"image":{"@id":"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/2023\/09\/04\/charting-a-new-course-for-military-cyber-threat-intelligence-through-structured-standards-and-protocols\/#organizationLogo"},"sameAs":["https:\/\/www.facebook.com\/CyberThreatIntelligenceNetwork\/","https:\/\/twitter.com\/CTIN_Global","https:\/\/www.linkedin.com\/in\/janeginn\/","https:\/\/bsky.app\/profile\/janeginn.bsky.social"]},{"@type":"Person","@id":"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/author\/niels-groenveld\/#author","url":"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/author\/niels-groenveld\/","name":"Niels Groenveld","image":{"@type":"ImageObject","url":"https:\/\/cyberthreatintelligencenetwork.com\/wp-content\/uploads\/2023\/01\/Niels-Headshot-e1674669418534.png"},"sameAs":["https:\/\/www.linkedin.com\/in\/nielsgroeneveld\/"],"description":"With a strategic role at Brica Business Risk Intelligence, my expertise in cybersecurity and network security has been pivotal in identifying new business opportunities and enhancing our threat intelligence capabilities. At the heart of my professional ethos lies a commitment to safeguarding digital ecosystems and empowering organizations through actionable intelligence.As a member of the EC-Council's Threat Intelligence Advisory Board, I leveraged my vast experience to contribute to the development of industry-leading practices. My tenure at Brica and EC-Council reflects a dedicated pursuit of excellence in cyber threat analysis, underscored by a deep understanding of Maltego and proactive business development strategies.","jobTitle":"Intelligence Analyst","alumniOf":[{"@type":"EducationalOrganization","name":"University of Amsterdam","sameAs":"https:\/\/www.linkedin.com\/school\/university-of-amsterdam\/"}]},{"@type":"WebPage","@id":"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/2023\/09\/04\/charting-a-new-course-for-military-cyber-threat-intelligence-through-structured-standards-and-protocols\/#webpage","url":"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/2023\/09\/04\/charting-a-new-course-for-military-cyber-threat-intelligence-through-structured-standards-and-protocols\/","name":"Charting a New Course for Military Cyber Threat Intelligence - CTIN","description":"The rapid advancements in cyber capabilities among nation-states and non-state actors alike have made the cyber domain a principal battleground, requiring military organizations to perpetually adapt and improve their Cyber Threat Intelligence frameworks.","inLanguage":"en-US","isPartOf":{"@id":"https:\/\/cyberthreatintelligencenetwork.com\/#website"},"breadcrumb":{"@id":"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/2023\/09\/04\/charting-a-new-course-for-military-cyber-threat-intelligence-through-structured-standards-and-protocols\/#breadcrumblist"},"author":{"@id":"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/author\/niels-groenveld\/#author"},"creator":{"@id":"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/author\/niels-groenveld\/#author"},"image":{"@type":"ImageObject","url":"https:\/\/cyberthreatintelligencenetwork.com\/wp-content\/uploads\/2023\/09\/Tanks-DigitalImages-RightSize.jpg","@id":"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/2023\/09\/04\/charting-a-new-course-for-military-cyber-threat-intelligence-through-structured-standards-and-protocols\/#mainImage","width":1480,"height":696},"primaryImageOfPage":{"@id":"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/2023\/09\/04\/charting-a-new-course-for-military-cyber-threat-intelligence-through-structured-standards-and-protocols\/#mainImage"},"datePublished":"2023-09-04T00:10:50+00:00","dateModified":"2024-04-29T10:36:02+00:00"},{"@type":"WebSite","@id":"https:\/\/cyberthreatintelligencenetwork.com\/#website","url":"https:\/\/cyberthreatintelligencenetwork.com\/","name":"Training Center","description":"Cybersecurity Center","inLanguage":"en-US","publisher":{"@id":"https:\/\/cyberthreatintelligencenetwork.com\/#organization"}}]},"og:locale":"en_US","og:site_name":"CTIN - Cybersecurity Center","og:type":"article","og:title":"Charting a New Course for Military Cyber Threat Intelligence - CTIN","og:description":"The rapid advancements in cyber capabilities among nation-states and non-state actors alike have made the cyber domain a principal battleground, requiring military organizations to perpetually adapt and improve their Cyber Threat Intelligence frameworks.","og:url":"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/2023\/09\/04\/charting-a-new-course-for-military-cyber-threat-intelligence-through-structured-standards-and-protocols\/","og:image":"https:\/\/cyberthreatintelligencenetwork.com\/wp-content\/uploads\/2024\/05\/SocialShare-Image.png","og:image:secure_url":"https:\/\/cyberthreatintelligencenetwork.com\/wp-content\/uploads\/2024\/05\/SocialShare-Image.png","og:image:width":112,"og:image:height":112,"article:published_time":"2023-09-04T00:10:50+00:00","article:modified_time":"2024-04-29T10:36:02+00:00","article:publisher":"https:\/\/www.facebook.com\/CyberThreatIntelligenceNetwork\/","twitter:card":"summary","twitter:site":"@CTIN_Global","twitter:title":"Charting a New Course for Military Cyber Threat Intelligence - CTIN","twitter:description":"The rapid advancements in cyber capabilities among nation-states and non-state actors alike have made the cyber domain a principal battleground, requiring military organizations to perpetually adapt and improve their Cyber Threat Intelligence frameworks.","twitter:creator":"@CTIN_Global","twitter:image":"https:\/\/cyberthreatintelligencenetwork.com\/wp-content\/uploads\/2024\/05\/SocialShare-Image.png"},"aioseo_meta_data":{"post_id":"1388","title":null,"description":null,"keywords":null,"keyphrases":{"focus":{"keyphrase":"","score":0,"analysis":{"keyphraseInTitle":{"score":0,"maxScore":9,"error":1}}},"additional":[]},"primary_term":{"category":330},"canonical_url":null,"og_title":null,"og_description":null,"og_object_type":"default","og_image_type":"default","og_image_url":null,"og_image_width":null,"og_image_height":null,"og_image_custom_url":null,"og_image_custom_fields":null,"og_video":"","og_custom_url":null,"og_article_section":null,"og_article_tags":null,"twitter_use_og":false,"twitter_card":"default","twitter_image_type":"default","twitter_image_url":null,"twitter_image_custom_url":null,"twitter_image_custom_fields":null,"twitter_title":null,"twitter_description":null,"schema":{"blockGraphs":[],"customGraphs":[],"default":{"data":{"Article":[],"Course":[],"Dataset":[],"FAQPage":[],"Movie":[],"Person":[],"Product":[],"ProductReview":[],"Car":[],"Recipe":[],"Service":[],"SoftwareApplication":[],"WebPage":[]},"graphName":"BlogPosting","isEnabled":true},"graphs":[]},"schema_type":"default","schema_type_options":null,"pillar_content":false,"robots_default":true,"robots_noindex":false,"robots_noarchive":false,"robots_nosnippet":false,"robots_nofollow":false,"robots_noimageindex":false,"robots_noodp":false,"robots_notranslate":false,"robots_max_snippet":"-1","robots_max_videopreview":"-1","robots_max_imagepreview":"large","priority":null,"frequency":"default","local_seo":null,"seo_analyzer_scan_date":"2025-08-25 21:53:52","breadcrumb_settings":null,"limit_modified_date":false,"reviewed_by":null,"open_ai":"{\"title\":{\"suggestions\":[],\"usage\":0},\"description\":{\"suggestions\":[],\"usage\":0}}","ai":null,"created":"2024-04-18 16:57:44","updated":"2025-08-25 21:53:52"},"aioseo_breadcrumb":"<div class=\"aioseo-breadcrumbs\"><span class=\"aioseo-breadcrumb\">\n\t<a href=\"https:\/\/cyberthreatintelligencenetwork.com\" title=\"Home\">Home<\/a>\n<\/span><span class=\"aioseo-breadcrumb-separator\">\u00bb<\/span><span class=\"aioseo-breadcrumb\">\n\t<a href=\"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/blog\/posts\/\" title=\"Posts\">Posts<\/a>\n<\/span><span class=\"aioseo-breadcrumb-separator\">\u00bb<\/span><span class=\"aioseo-breadcrumb\">\n\t<a href=\"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/category\/operations\/\" title=\"Operations\">Operations<\/a>\n<\/span><span class=\"aioseo-breadcrumb-separator\">\u00bb<\/span><span class=\"aioseo-breadcrumb\">\n\tCharting a New Course for Military Cyber Threat Intelligence\n<\/span><\/div>","aioseo_breadcrumb_json":[{"label":"Home","link":"https:\/\/cyberthreatintelligencenetwork.com"},{"label":"Posts","link":"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/blog\/posts\/"},{"label":"Operations","link":"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/category\/operations\/"},{"label":"Charting a New Course for Military Cyber Threat Intelligence","link":"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/2023\/09\/04\/charting-a-new-course-for-military-cyber-threat-intelligence-through-structured-standards-and-protocols\/"}],"amp_enabled":false,"_links":{"self":[{"href":"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/wp-json\/wp\/v2\/posts\/1388","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/wp-json\/wp\/v2\/users\/8"}],"replies":[{"embeddable":true,"href":"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/wp-json\/wp\/v2\/comments?post=1388"}],"version-history":[{"count":42,"href":"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/wp-json\/wp\/v2\/posts\/1388\/revisions"}],"predecessor-version":[{"id":3401,"href":"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/wp-json\/wp\/v2\/posts\/1388\/revisions\/3401"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/wp-json\/wp\/v2\/media\/1425"}],"wp:attachment":[{"href":"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/wp-json\/wp\/v2\/media?parent=1388"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/wp-json\/wp\/v2\/categories?post=1388"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/wp-json\/wp\/v2\/tags?post=1388"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}