John, gathering data about ongoing cyberattacks can help security teams improve their defenses by identifying online exploits that have the potential to hit their organizations and deploy security resources accordingly. How should your team collect threat intelligence? What are some top sources of threat intelligence? How do you correlate this intelligence with internal cybersecurity telemetry to determine which attacks to worry about?