Files
awesome-threat-intelligence/docs/sans-whos-using-cyberthreat-intelligence-and-how.pdf