Tech »  Understand how cyber threat intelligence can leverage capabilities of network detection, response