3:I[6731,[],""] 5:I[2923,[],""] 6:I[3500,["315","static/chunks/e087448e-2f2367f04faea473.js","540","static/chunks/6661209f-4ce31348cb1cca42.js","583","static/chunks/a594442f-578284994623e810.js","812","static/chunks/812-46786ddcee160b75.js","919","static/chunks/919-8103c6c91f8facdc.js","500","static/chunks/500-1193d1955921814f.js","932","static/chunks/932-80b4ddcdfe5a178a.js","308","static/chunks/app/blog/%5Bslug%5D/page-b930ad2db2b3f37c.js"],""] 8:I[5960,["500","static/chunks/500-1193d1955921814f.js","185","static/chunks/app/layout-aefed4accc7284b3.js"],"ThemeProvider"] 9:I[9812,["315","static/chunks/e087448e-2f2367f04faea473.js","540","static/chunks/6661209f-4ce31348cb1cca42.js","583","static/chunks/a594442f-578284994623e810.js","812","static/chunks/812-46786ddcee160b75.js","919","static/chunks/919-8103c6c91f8facdc.js","500","static/chunks/500-1193d1955921814f.js","932","static/chunks/932-80b4ddcdfe5a178a.js","308","static/chunks/app/blog/%5Bslug%5D/page-b930ad2db2b3f37c.js"],""] 4:["slug","quality-over-quantity-cyber-intelligence","d"] 7:T40e,[{"@context":"https://schema.org","@type":"Organization","@id":"https://unit6tech.com/#organization","name":"Unit6","url":"https://unit6tech.com","logo":{"@type":"ImageObject","url":"https://unit6tech.com/favicon.ico"},"description":"Unit6 turns adversary plans into foresight you can act on — decoding infrastructure, staging boxes, and recon chatter so you can stop attacks before they start.","sameAs":["https://www.linkedin.com/company/unit6tech"]},{"@context":"https://schema.org","@type":"WebSite","@id":"https://unit6tech.com/#website","url":"https://unit6tech.com","name":"Unit6: The Preventive Intelligence Company","description":"Unit6 turns adversary plans into foresight you can act on — decoding infrastructure, staging boxes, and recon chatter so you can stop attacks before they start.","publisher":{"@id":"https://unit6tech.com/#organization"},"inLanguage":"en","potentialAction":{"@type":"SearchAction","target":"https://unit6tech.com/search?q={search_term_string}","query-input":"required name=search_term_string"}}]0:["bunrciYijO3DOgSF60x8R",[[["",{"children":["blog",{"children":[["slug","quality-over-quantity-cyber-intelligence","d"],{"children":["__PAGE__?{\"slug\":\"quality-over-quantity-cyber-intelligence\"}",{}]}]}]},"$undefined","$undefined",true],["",{"children":["blog",{"children":[["slug","quality-over-quantity-cyber-intelligence","d"],{"children":["__PAGE__",{},[["$L1","$L2"],null],null]},["$","$L3",null,{"parallelRouterKey":"children","segmentPath":["children","blog","children","$4","children"],"error":"$undefined","errorStyles":"$undefined","errorScripts":"$undefined","template":["$","$L5",null,{}],"templateStyles":"$undefined","templateScripts":"$undefined","notFound":"$undefined","notFoundStyles":"$undefined","styles":null}],null]},["$","$L3",null,{"parallelRouterKey":"children","segmentPath":["children","blog","children"],"error":"$undefined","errorStyles":"$undefined","errorScripts":"$undefined","template":["$","$L5",null,{}],"templateStyles":"$undefined","templateScripts":"$undefined","notFound":"$undefined","notFoundStyles":"$undefined","styles":null}],null]},[["$","html",null,{"className":"antialiased __variable_41251a","lang":"en","suppressHydrationWarning":true,"children":[["$","head",null,{"children":[["$","$L6",null,{"id":"gtm-base","strategy":"lazyOnload","children":"\n (function(w,d,s,l,i){w[l]=w[l]||[];w[l].push({'gtm.start':\n new Date().getTime(),event:'gtm.js'});var f=d.getElementsByTagName(s)[0],\n j=d.createElement(s),dl=l!='dataLayer'?'&l='+l:'';j.async=true;j.src=\n 'https://www.googletagmanager.com/gtm.js?id='+i+dl;f.parentNode.insertBefore(j,f);\n })(window,document,'script','dataLayer','GTM-KMD6X5T8');\n "}],["$","$L6",null,{"id":"structured-data","type":"application/ld+json","strategy":"beforeInteractive","children":"$7"}],null]}],["$","body",null,{"className":"__className_f367f3","children":[["$","noscript",null,{"children":["$","iframe",null,{"src":"https://www.googletagmanager.com/ns.html?id=GTM-KMD6X5T8","height":"0","width":"0","style":{"display":"none","visibility":"hidden"}}]}],["$","$L6",null,{"id":"theme-init","strategy":"beforeInteractive","children":"\n try {\n const storedTheme = localStorage.getItem('theme');\n const prefersDark = window.matchMedia('(prefers-color-scheme: dark)').matches;\n const theme = storedTheme === 'light' || storedTheme === 'dark' ? storedTheme : (prefersDark ? 'dark' : 'light');\n const root = document.documentElement;\n root.classList.remove('light', 'dark');\n root.classList.add(theme);\n root.dataset.theme = storedTheme ?? 'system';\n } catch (_error) {}\n "}],["$","$L8",null,{"children":["$","$L3",null,{"parallelRouterKey":"children","segmentPath":["children"],"error":"$undefined","errorStyles":"$undefined","errorScripts":"$undefined","template":["$","$L5",null,{}],"templateStyles":"$undefined","templateScripts":"$undefined","notFound":["$","main",null,{"className":"flex min-h-screen flex-col items-center justify-center bg-gradient-to-b from-slate-50 via-white to-sky-50 px-6 text-center text-slate-900 dark:from-slate-950 dark:via-slate-900 dark:to-slate-950 dark:text-white","children":[["$","p",null,{"className":"text-xs uppercase tracking-[0.35em] text-slate-500 dark:text-slate-400","children":"Page not found"}],["$","h1",null,{"className":"mt-4 text-4xl font-semibold sm:text-5xl","children":"Looks like that trail went cold."}],["$","p",null,{"className":"mt-4 max-w-xl text-base text-slate-600 dark:text-slate-300","children":"The page you are looking for has moved or no longer exists. Head back to the main site or explore our latest resources."}],["$","div",null,{"className":"mt-8 flex flex-col gap-3 sm:flex-row","children":[["$","$L9",null,{"href":"/","className":"rounded-full bg-slate-900 px-5 py-3 text-sm font-semibold text-white shadow-sm transition hover:bg-slate-800 focus-visible:outline focus-visible:outline-2 focus-visible:outline-offset-2 focus-visible:outline-slate-500 dark:bg-white dark:text-slate-900 dark:hover:bg-slate-100","children":"Back to homepage"}],["$","$L9",null,{"href":"/resources/gaming","className":"rounded-full border border-slate-200 px-5 py-3 text-sm font-semibold text-slate-700 transition hover:border-slate-300 dark:border-white/20 dark:text-white dark:hover:border-white/30","children":"View resources"}]]}]]}],"notFoundStyles":[],"styles":null}]}]]}]]}],null],null],[[["$","link","0",{"rel":"stylesheet","href":"/_next/static/css/2a2d44bd966c4d53.css","precedence":"next","crossOrigin":"$undefined"}],["$","link","1",{"rel":"stylesheet","href":"/_next/static/css/582d575b359aac35.css","precedence":"next","crossOrigin":"$undefined"}]],[null,"$La"]]]]] b:I[6932,["315","static/chunks/e087448e-2f2367f04faea473.js","540","static/chunks/6661209f-4ce31348cb1cca42.js","583","static/chunks/a594442f-578284994623e810.js","812","static/chunks/812-46786ddcee160b75.js","919","static/chunks/919-8103c6c91f8facdc.js","500","static/chunks/500-1193d1955921814f.js","932","static/chunks/932-80b4ddcdfe5a178a.js","308","static/chunks/app/blog/%5Bslug%5D/page-b930ad2db2b3f37c.js"],"default"] d:I[5750,["315","static/chunks/e087448e-2f2367f04faea473.js","540","static/chunks/6661209f-4ce31348cb1cca42.js","583","static/chunks/a594442f-578284994623e810.js","812","static/chunks/812-46786ddcee160b75.js","919","static/chunks/919-8103c6c91f8facdc.js","500","static/chunks/500-1193d1955921814f.js","932","static/chunks/932-80b4ddcdfe5a178a.js","308","static/chunks/app/blog/%5Bslug%5D/page-b930ad2db2b3f37c.js"],"Image"] c:Td69,[{"@context":"https://schema.org","@type":"Article","headline":"Quality Over Quantity: The Key to Effective Cyber Intelligence","description":"What the Intelligence Community's INR can teach defenders about collecting the right data and acting on it fast.","url":"https://unit6tech.com/blog/quality-over-quantity-cyber-intelligence","mainEntityOfPage":"https://unit6tech.com/blog/quality-over-quantity-cyber-intelligence","image":"https://unit6tech.com/images/watcher.webp","author":{"@type":"Person","name":"Unit6 Intel Team"},"publisher":{"@type":"Organization","name":"Unit6","logo":{"@type":"ImageObject","url":"https://unit6tech.com/favicon.ico"}},"datePublished":"2024-06-09T21:00:00.000Z","dateModified":"2024-06-09T21:00:00.000Z","articleSection":"Research","articleBody":"In today's data-driven world it's easy to believe that more data automatically means more value, but only high-quality, relevant data actually moves the needle. I recently revisited the Bureau of Intelligence and Research and how such a small office inside the Intelligence Community consistently outperforms much larger peers. Despite operating with a below-modest budget and a limited workforce, INR thrives because it prioritizes expertise and context. The staff are true subject-matter experts empowered to deliver accurate, actionable intelligence. That observation raises two questions for security leaders: how do we adopt the same discipline to defeat adversaries, and what does it take to unlock the benefits of that philosophy? Focus on quality intelligence by targeting data collection. Go beyond what is publicly available and reach into the threat actors' playground. Persistent access to attacker infrastructure and communications fills gaps that open-source feeds will never close. Once the right information is collected it has to be actioned. AI and machine learning can accelerate analysts, but the human element and the surrounding platform design decide whether the intel is trusted. That is why platforms must integrate seamlessly into the current architecture, delivering insights the moment analysts need them without demanding a total rebuild. Cyber security is also a collaborative exercise. Breaking down product silos and reestablishing norms around shared context is the only way to cover the modern threat landscape. At Unit6 Technologies we built Unit6 Intel as a centralized source of truth with more than 2,000 integrations out of the box, so it can enhance every other tool you already rely on. Unit6 Intel collects and processes information from the entire digital landscape, from open source and social media to deep and dark web communities and our own passive collection assets. That unique access gives organizations a broader, clearer understanding of adversary intentions whether they're dealing with script kiddies, hacktivists, nation states, or organized criminal crews. Join us in embracing quality over quantity so every decision is powered by the most precise signal available."},{"@context":"https://schema.org","@type":"BreadcrumbList","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https://unit6tech.com/"},{"@type":"ListItem","position":2,"name":"Blog","item":"https://unit6tech.com/blog"},{"@type":"ListItem","position":3,"name":"Quality Over Quantity: The Key to Effective Cyber Intelligence","item":"https://unit6tech.com/blog/quality-over-quantity-cyber-intelligence"}]}]2:["$","div",null,{"className":"relative min-h-screen overflow-hidden bg-gradient-to-b from-slate-50 via-white to-sky-50 text-slate-900 dark:from-[#03030c] dark:via-[#05031a] dark:to-[#010108] dark:text-white","children":[["$","div",null,{"className":"pointer-events-none absolute inset-0","children":[["$","div",null,{"className":"absolute -top-24 left-1/2 h-[640px] w-[640px] -translate-x-1/2 rounded-full bg-sky-500/20 blur-[180px]"}],["$","div",null,{"className":"absolute bottom-8 right-12 h-[420px] w-[420px] rounded-full bg-indigo-600/20 blur-[150px]"}]]}],["$","$Lb",null,{}],["$","main",null,{"className":"relative z-10 mx-auto flex w-full max-w-5xl flex-col px-6 pt-32 pb-24 lg:px-0","children":[["$","$L6",null,{"id":"blog-jsonld-quality-over-quantity-cyber-intelligence","type":"application/ld+json","strategy":"beforeInteractive","children":"$c"}],["$","div",null,{"className":"flex flex-col items-center text-center","children":[["$","p",null,{"className":"text-xs uppercase tracking-[0.4em] text-slate-500 dark:text-slate-400","children":"Research"}],["$","h1",null,{"className":"mt-4 text-4xl font-semibold leading-tight text-slate-900 dark:text-white md:text-5xl","children":"Quality Over Quantity: The Key to Effective Cyber Intelligence"}],["$","p",null,{"className":"mt-4 text-base text-slate-600 dark:text-slate-300 md:text-lg","children":"What the Intelligence Community's INR can teach defenders about collecting the right data and acting on it fast."}],["$","div",null,{"className":"mt-6 flex flex-wrap items-center justify-center gap-3 text-sm text-slate-500 dark:text-slate-400","children":[["$","span",null,{"className":"font-semibold text-slate-900 dark:text-white","children":"Unit6 Intel Team"}],["$","span",null,{"className":"text-slate-300 dark:text-white/30","children":"•"}],["$","span",null,{"children":"Research & Tradecraft"}],["$","span",null,{"className":"text-slate-300 dark:text-white/30","children":"•"}],["$","span",null,{"children":"June 10, 2024"}],["$","span",null,{"className":"text-slate-300 dark:text-white/30","children":"•"}],["$","span",null,{"children":"3 min read"}]]}]]}],["$","div",null,{"className":"mt-12 overflow-hidden rounded-[32px] border border-slate-200 dark:border-white/10 bg-white/90 dark:bg-white/5 shadow-2xl shadow-sky-500/10","children":["$","div",null,{"className":"relative h-[420px] w-full","children":[["$","$Ld",null,{"src":"/images/watcher.webp","alt":"Quality Over Quantity: The Key to Effective Cyber Intelligence","fill":true,"className":"object-cover","sizes":"(max-width: 768px) 100vw, 75vw","priority":true}],["$","div",null,{"className":"absolute inset-0 bg-gradient-to-t from-black/70 via-black/10 to-transparent"}]]}]}],["$","article",null,{"className":"mt-12 space-y-6 text-lg leading-relaxed text-slate-500 dark:text-slate-200","children":[["$","p","quality-over-quantity-cyber-intelligence-content-0",{"children":"In today's data-driven world it's easy to believe that more data automatically means more value, but only high-quality, relevant data actually moves the needle."}],["$","p","quality-over-quantity-cyber-intelligence-content-1",{"children":"I recently revisited the Bureau of Intelligence and Research and how such a small office inside the Intelligence Community consistently outperforms much larger peers."}],["$","p","quality-over-quantity-cyber-intelligence-content-2",{"children":"Despite operating with a below-modest budget and a limited workforce, INR thrives because it prioritizes expertise and context. The staff are true subject-matter experts empowered to deliver accurate, actionable intelligence."}],["$","p","quality-over-quantity-cyber-intelligence-content-3",{"children":"That observation raises two questions for security leaders: how do we adopt the same discipline to defeat adversaries, and what does it take to unlock the benefits of that philosophy?"}],["$","p","quality-over-quantity-cyber-intelligence-content-4",{"children":"Focus on quality intelligence by targeting data collection. Go beyond what is publicly available and reach into the threat actors' playground. Persistent access to attacker infrastructure and communications fills gaps that open-source feeds will never close."}],["$","p","quality-over-quantity-cyber-intelligence-content-5",{"children":"Once the right information is collected it has to be actioned. AI and machine learning can accelerate analysts, but the human element and the surrounding platform design decide whether the intel is trusted."}],["$","p","quality-over-quantity-cyber-intelligence-content-6",{"children":"That is why platforms must integrate seamlessly into the current architecture, delivering insights the moment analysts need them without demanding a total rebuild."}],["$","p","quality-over-quantity-cyber-intelligence-content-7",{"children":"Cyber security is also a collaborative exercise. Breaking down product silos and reestablishing norms around shared context is the only way to cover the modern threat landscape."}],["$","p","quality-over-quantity-cyber-intelligence-content-8",{"children":"At Unit6 Technologies we built Unit6 Intel as a centralized source of truth with more than 2,000 integrations out of the box, so it can enhance every other tool you already rely on."}],["$","p","quality-over-quantity-cyber-intelligence-content-9",{"children":"Unit6 Intel collects and processes information from the entire digital landscape, from open source and social media to deep and dark web communities and our own passive collection assets."}],["$","p","quality-over-quantity-cyber-intelligence-content-10",{"children":"That unique access gives organizations a broader, clearer understanding of adversary intentions whether they're dealing with script kiddies, hacktivists, nation states, or organized criminal crews."}],["$","p","quality-over-quantity-cyber-intelligence-content-11",{"children":"Join us in embracing quality over quantity so every decision is powered by the most precise signal available."}]]}],["$","div",null,{"className":"mt-12 flex flex-wrap items-center justify-between gap-4 border-t border-slate-200 pt-8 text-sm text-slate-500 dark:border-white/10 dark:text-slate-400","children":[["$","$L9",null,{"href":"/blog","className":"inline-flex items-center gap-2 rounded-full border border-slate-200 px-4 py-2 text-slate-700 transition hover:border-slate-300 hover:bg-white dark:border-white/20 dark:text-white dark:hover:border-white/40 dark:hover:bg-white/10","children":"← Back to all articles"}],["$","span",null,{"className":"uppercase tracking-[0.4em] text-slate-500","children":"Unit6 Blog"}]]}],["$","section",null,{"className":"mt-16","children":[["$","div",null,{"className":"flex items-center gap-3","children":[["$","span",null,{"className":"text-xs uppercase tracking-[0.3em] text-slate-500 dark:text-slate-400","children":"Read next"}],["$","div",null,{"className":"h-px flex-1 bg-gradient-to-r from-slate-200 via-slate-100 to-transparent dark:from-white/40 dark:via-white/10"}]]}],["$","div",null,{"className":"mt-8 grid gap-6 md:grid-cols-2 lg:grid-cols-3","children":[["$","$L9","here-is-your-problem-cyber-intel",{"href":"/blog/here-is-your-problem-cyber-intel","className":"group no-underline","children":["$","article",null,{"className":"flex h-full flex-col overflow-hidden rounded-3xl border border-slate-200 bg-white shadow-[0_10px_35px_rgba(15,23,42,0.08)] transition hover:-translate-y-1 hover:shadow-[0_20px_50px_rgba(15,23,42,0.12)] dark:border-white/10 dark:bg-white/5","children":[["$","div",null,{"className":"relative h-40 w-full","children":[["$","$Ld",null,{"src":"/images/unit6-cover.webp","alt":"Here Is Your Problem. Here Is Why You Can't Fix It. Here Is How We Do.","fill":true,"className":"object-cover transition duration-500 group-hover:scale-105","sizes":"(max-width: 768px) 100vw, 33vw"}],["$","div",null,{"className":"absolute inset-0 bg-gradient-to-t from-black/60 via-transparent"}],["$","span",null,{"className":"absolute left-4 top-4 rounded-full bg-black/70 px-3 py-1 text-xs text-white","children":"Insights"}]]}],["$","div",null,{"className":"flex flex-1 flex-col gap-3 p-6","children":[["$","h3",null,{"className":"text-lg font-semibold text-slate-900 dark:text-white","children":"Here Is Your Problem. Here Is Why You Can't Fix It. Here Is How We Do."}],["$","p",null,{"className":"text-sm text-slate-600 dark:text-slate-400","children":"Every time I meet with a CISO we eventually land on the same three sentences."}],["$","div",null,{"className":"mt-auto flex items-center gap-2 text-xs uppercase tracking-widest text-slate-500 dark:text-slate-400","children":[["$","span",null,{"className":"font-semibold text-slate-900 dark:text-white","children":"Unit6 Team"}],["$","span",null,{"className":"text-slate-300 dark:text-white/30","children":"•"}],["$","span",null,{"children":"4 min read"}]]}]]}]]}]}],["$","$L9","why-cisos-need-cyber-threat-intelligence",{"href":"/blog/why-cisos-need-cyber-threat-intelligence","className":"group no-underline","children":["$","article",null,{"className":"flex h-full flex-col overflow-hidden rounded-3xl border border-slate-200 bg-white shadow-[0_10px_35px_rgba(15,23,42,0.08)] transition hover:-translate-y-1 hover:shadow-[0_20px_50px_rgba(15,23,42,0.12)] dark:border-white/10 dark:bg-white/5","children":[["$","div",null,{"className":"relative h-40 w-full","children":[["$","$Ld",null,{"src":"/images/unit6-cover.webp","alt":"Why CISOs Need Cyber Threat Intelligence","fill":true,"className":"object-cover transition duration-500 group-hover:scale-105","sizes":"(max-width: 768px) 100vw, 33vw"}],["$","div",null,{"className":"absolute inset-0 bg-gradient-to-t from-black/60 via-transparent"}],["$","span",null,{"className":"absolute left-4 top-4 rounded-full bg-black/70 px-3 py-1 text-xs text-white","children":"Insights"}]]}],["$","div",null,{"className":"flex flex-1 flex-col gap-3 p-6","children":[["$","h3",null,{"className":"text-lg font-semibold text-slate-900 dark:text-white","children":"Why CISOs Need Cyber Threat Intelligence"}],["$","p",null,{"className":"text-sm text-slate-600 dark:text-slate-400","children":"The real-world benefits of CTI for security leaders, the business, and teams without endless budgets."}],["$","div",null,{"className":"mt-auto flex items-center gap-2 text-xs uppercase tracking-widest text-slate-500 dark:text-slate-400","children":[["$","span",null,{"className":"font-semibold text-slate-900 dark:text-white","children":"Unit6 Team"}],["$","span",null,{"className":"text-slate-300 dark:text-white/30","children":"•"}],["$","span",null,{"children":"4 min read"}]]}]]}]]}]}],["$","$L9","what-is-cyber-threat-intelligence",{"href":"/blog/what-is-cyber-threat-intelligence","className":"group no-underline","children":["$","article",null,{"className":"flex h-full flex-col overflow-hidden rounded-3xl border border-slate-200 bg-white shadow-[0_10px_35px_rgba(15,23,42,0.08)] transition hover:-translate-y-1 hover:shadow-[0_20px_50px_rgba(15,23,42,0.12)] dark:border-white/10 dark:bg-white/5","children":[["$","div",null,{"className":"relative h-40 w-full","children":[["$","$Ld",null,{"src":"/images/watcher.webp","alt":"What Is Cyber Threat Intelligence?","fill":true,"className":"object-cover transition duration-500 group-hover:scale-105","sizes":"(max-width: 768px) 100vw, 33vw"}],["$","div",null,{"className":"absolute inset-0 bg-gradient-to-t from-black/60 via-transparent"}],["$","span",null,{"className":"absolute left-4 top-4 rounded-full bg-black/70 px-3 py-1 text-xs text-white","children":"Research"}]]}],["$","div",null,{"className":"flex flex-1 flex-col gap-3 p-6","children":[["$","h3",null,{"className":"text-lg font-semibold text-slate-900 dark:text-white","children":"What Is Cyber Threat Intelligence?"}],["$","p",null,{"className":"text-sm text-slate-600 dark:text-slate-400","children":"Why quality, relevance, and access, not volume, define threat intelligence defenders can trust."}],["$","div",null,{"className":"mt-auto flex items-center gap-2 text-xs uppercase tracking-widest text-slate-500 dark:text-slate-400","children":[["$","span",null,{"className":"font-semibold text-slate-900 dark:text-white","children":"Unit6 Intel Team"}],["$","span",null,{"className":"text-slate-300 dark:text-white/30","children":"•"}],["$","span",null,{"children":"5 min read"}]]}]]}]]}]}]]}]]}]]}]]}] a:[["$","meta","0",{"name":"viewport","content":"width=device-width, initial-scale=1"}],["$","meta","1",{"charSet":"utf-8"}],["$","title","2",{"children":"Quality Over Quantity: The Key to Effective Cyber Intelligence | Unit6 Blog | Unit6"}],["$","meta","3",{"name":"description","content":"What the Intelligence Community's INR can teach defenders about collecting the right data and acting on it fast."}],["$","meta","4",{"name":"keywords","content":"preventive intelligence,adversary infrastructure,attack staging,threat reconnaissance,early warning security platform"}],["$","meta","5",{"name":"robots","content":"index, follow"}],["$","link","6",{"rel":"canonical","href":"https://unit6tech.com/blog/quality-over-quantity-cyber-intelligence"}],["$","meta","7",{"property":"og:title","content":"Quality Over Quantity: The Key to Effective Cyber Intelligence"}],["$","meta","8",{"property":"og:description","content":"What the Intelligence Community's INR can teach defenders about collecting the right data and acting on it fast."}],["$","meta","9",{"property":"og:url","content":"https://unit6tech.com/blog/quality-over-quantity-cyber-intelligence"}],["$","meta","10",{"property":"og:site_name","content":"Unit6"}],["$","meta","11",{"property":"og:image","content":"https://unit6tech.com/images/watcher.webp"}],["$","meta","12",{"property":"og:type","content":"article"}],["$","meta","13",{"property":"article:published_time","content":"2024-06-09T21:00:00.000Z"}],["$","meta","14",{"name":"twitter:card","content":"summary_large_image"}],["$","meta","15",{"name":"twitter:creator","content":"@unit6tech"}],["$","meta","16",{"name":"twitter:title","content":"Quality Over Quantity: The Key to Effective Cyber Intelligence"}],["$","meta","17",{"name":"twitter:description","content":"What the Intelligence Community's INR can teach defenders about collecting the right data and acting on it fast."}],["$","meta","18",{"name":"twitter:image","content":"https://unit6tech.com/images/watcher.webp"}],["$","link","19",{"rel":"icon","href":"/favicon.ico","type":"image/x-icon","sizes":"20x32"}],["$","meta","20",{"name":"next-size-adjust"}]] 1:null