With evolving threats, securing IT infrastructure remains a challenge. Traditional methods like Cyber Threat Intelligence (CTI) sharing and SIEM systems detect attacks but often rely on prior breaches. Yet, emerging threat discussions exist in open-source repositories, security advisories, blogs, and
Proactive Cyber Threat Intelligence: Automating the Intelligence Life Cycle based on Open Sources – Congratulations to *Dr. -Ing.* Philipp Kühn on His Successful Doctoral Defense
