
Alexandra Borgeaud
Research expert covering cybersecurity and tech in Latin America
Get in touch with us nowIn a 2024 survey, when asked what methods are most leveraged in cyber threat intelligence (CTI) analysis, over 67 percent of respondents indicated frequently using knowledge bases such as Mitre ATT&CK, and around 28 percent stated using this method occasionally. By contrast, using structured analytic techniques, such as key assumptions check, clustering, or Analysis of Competing Hypothesis (ACH) was the least used method for analysis.
* For commercial use only
Basic Account
Starter Account
The statistic on this page is a Premium Statistic and is included in this account.
Professional Account
1 All prices do not include sales tax. The account requires an annual contract and will renew after one year to the regular list price.
Everything on "Cyber Threat Intelligence" in one document: edited and divided into chapters, including detailed references.
I think of Statista as Google for researchers. Statista provides you with the information you search for right away.![]()
Dr. Horst Stipp
EVP, Research & Innovation, Advertising Research Foundation
Overview
CTI Market
CTI Data
DevSecOps
Companies
Special focus: Cyberttacks
* For commercial use only
Basic Account
Starter Account
The statistic on this page is a Premium Statistic and is included in this account.
Professional Account
1 All prices do not include sales tax. The account requires an annual contract and will renew after one year to the regular list price.