Most of what’s sold as “threat intelligence” today isn’t intelligence at all.
Instead, it’s data, lists of IP addresses, hashes, and domains, with little to no context. These indicators of compromise (IOCs) are useful, but on their own, they don’t answer the questions defenders need answered: Who is targeting us? Is this IoC recent or historic? What are they after? What else are they likely to do or might have already done?
True intelligence isn’t about lists, it’s about decisions. It’s about turning raw data into insights that help organisations act with confidence. That’s what the intelligence cycle is for. It is the core of what Arachne Digital does.
In this post, we’ll walk through the classical intelligence cycle, and show how it applies to modern cyber threat intelligence (CTI). If you’re in a Security Operations Centre (SOC), leading a security program, or evaluating threat intel vendors, this is what you should expect from real intelligence.
The intelligence cycle is a progressive refinement of data into intelligence. It’s not a one-time transaction, and it doesn’t begin with information, it begins with questions.
Let’s break it down.
Planning and Direction is the first phase of the intelligence cycle. It involves identifying and prioritising the information needs of an organisation in order to align cyber threat intelligence (CTI) efforts with strategic, operational, or tactical objectives.
At this stage, decision-makers or stakeholders define their intelligence requirements, the critical questions that need to be answered to inform security decisions, reduce risk, or guide response. These requirements form the foundation for all subsequent CTI activities.
In practice, Planning and Direction includes:
In CTI, the equivalent to all of this is your operational context: What are you trying to protect? Who is likely to target you? What do you need to know to defend your organisation?
This is where Arachne Digital begins. We tailor CTI feeds for your industry and geography so you can understand your threat landscape, and risk posture. If you are more mature and what to define your own requirements, you can access our entire database of cybercrime and nation-state threats across regions.
Collection is the second phase of the intelligence cycle. It involves gathering raw data from relevant sources to address the intelligence requirements defined during the Planning and Direction phase.
In cyber threat intelligence, collection spans a range of disciplines, including open-source intelligence (OSINT), technical telemetry, and clear and dark web monitoring. The goal is to collect data that may contain evidence of threat activity, tools, infrastructure, intent, or targeting, all of which help answer questions posed during planning.
Effective collection is:
Collection for Arachne Digital is driven by our tool Tracery, which automates the process of discovering and retrieving URLs containing relevant cybersecurity content based on pre-defined keywords and intelligence priorities. These sources include:
The result is a rich body of unstructured free text, raw data that will be processed in the next stage to begin transforming it into actionable intelligence.
This is raw data, unstructured, messy, but valuable.
Processing and Exploitation is the third phase of the intelligence cycle. It involves converting raw, collected data into a structured and usable format, preparing it for analysis.
In the context of cyber threat intelligence, this step includes:
The goal is to turn raw data, such as technical blogs, incident writeups, or forum posts, into organised, machine and human-readable information that can be meaningfully analysed.
For Arachne Digital, this step is performed by our analyst dashboard Thread, which processes free-text documents collected via Tracery. Thread:
Processing and exploitation marks the transition from data to information, structured content that is ready to be interpreted and turned into intelligence.
But we’re not done.
Analysis and Production is the fourth phase of the intelligence cycle. It involves evaluating, interpreting, and contextualising the information gathered during collection and processing in order to generate finished intelligence that can support decision-making.
In cyber threat intelligence, analysis is where raw indicators and structured data are transformed into insight. Analysts:
Production refers to the creation of the final intelligence deliverables, reports, briefings, or machine-readable formats, based on the analysis. These outputs are tailored to the needs of the end user, whether that’s a SOC analyst tuning detections or a CISO planning investments.
Human analysts take the structured output from Thread and apply expert judgment to:
We integrate disparate findings, and use ATT&CK to interpret what the data means. Is this TTP relevant to my organisation? What defensive tooling should I invest in based on the threat landscape? Does my SIEM have the right logs and analytics configured?
This phase turns information into intelligence, a finished product that is assessed, contextual, and actionable.
Dissemination and Integration is the fifth phase of the intelligence cycle. It involves delivering finished intelligence products to the right stakeholders in a format they can use, and ensuring that intelligence is integrated into operational workflows and decision-making.
In cyber threat intelligence, dissemination must be:
Integration is the often-overlooked second half of this phase. It means ensuring the intelligence doesn’t just sit in a report or dashboard, it’s used:
Arachne Digital delivers intelligence in two key ways:
Each piece of intelligence we produce is designed to map cleanly to operational needs, whether that’s an analyst writing a detection rule, a threat hunter investigating anomalies, or a CISO planning for risk.
Need a high-level overview? You’ll get a summary. Need tactical indicators? You’ll get them too, mapped to ATT&CK and enriched with context.
And because our intelligence is structured and dated, you can track trends over time, align detections with threat-informed defence, and prioritise mitigations that matter.
The value of intelligence is only realised when it’s disseminated effectively and integrated seamlessly into the systems and decisions it was built to support.
Evaluation and Feedback is the final phase of the intelligence cycle. It ensures that the intelligence provided is meeting the needs of decision-makers and that the cycle remains dynamic, responsive, and continuously improving.
In cyber threat intelligence, evaluation involves assessing:
Feedback is the mechanism by which consumers of intelligence, whether SOC analysts, incident responders, or executive leadership, communicate their experience and evolving needs back to the intelligence team. This feedback may include:
For Arachne Digital, this phase is essential to maintaining the integrity of our work. We actively seek feedback through:
We want to hear from our customers about what is working for them and what is not, so we can make better tools and generate better CTI to serve you.
This closed loop ensures our intelligence stays relevant, focused, and aligned to your mission.
Many CTI providers give you indicators. Few give you intelligence.
We have built the Arachne Digital workflow around the full intelligence cycle, direction, collection, processing, analysis, dissemination, and feedback, because that’s what makes intelligence actionable.
We believe SOCs deserve better than static lists of IPs. Security leaders deserve insights, not noise. And everyone deserves the context to make informed decisions.
If your current CTI isn’t built on the intelligence cycle, ask why.
We’re building threat intelligence the way it’s meant to be: structured, contextual, and decision-ready.
Ready to work with intelligence that informs action?
Get in touch or explore our API to learn more.
“Arachne Digital’s team works closely with us in integrating our tool, Speculo, with their data. Speculo is designed to help organisations get a full picture of their cyber risk with reliable analytics and a streamlined risk assessment process. The integration of Arachne Digital’s threat intelligence into Speculo provides evidence-based insights into cyber risks, making the tool more relevant to our customers. Arachne facilitated multiple face-to-face meetings and video calls, provided technical resources, comprehensive documentation, and example reports. This collaboration ensured that we could seamlessly integrate and utilize their data, significantly enriching the value we deliver to our clients.
Arachne Digital’s commitment to excellence and their proactive approach in supporting our needs have made them an indispensable partner. We highly recommend their services to any organisation looking to strengthen their threat intelligence capabilities.”
Arachne Digital is proud to partner with the DISARM Foundation as the inaugural member of their Partner Programme, launched at the beginning of 2024.
This partnership is crucial in supporting the DISARM Foundation’s mission to maintain and enhance the DISARM Framework, ensuring it remains a free and continuously updated resource in the fight against disinformation.
Through our collaboration, Arachne Digital provides valuable feedback, promotes the integration of the framework into our operations, and encourages wider adoption within the defender community. This partnership highlights our commitment to combating evolving threats and fostering a secure digital environment.