<?xml version="1.0" encoding="utf-8"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>SEI Blog | Cyber Intelligence </title><link>http://www.sei.cmu.edu/feeds/tag/</link><description>Updates on changes and additions to the                         SEI Blog for posts matching Cyber Intelligence </description><atom:link href="http://www.sei.cmu.edu/blog/feeds/tag/cyber-intelligence/atom/" rel="self"/><language>en-us</language><lastBuildDate>Mon, 21 May 2018 00:00:00 -0400</lastBuildDate><item><title>Best Practices for Cyber Intelligence: A Look at the ODNI Cyber Intelligence Study and Some Early Findings</title><link>https://www.sei.cmu.edu/blog/best-practices-for-cyber-intelligence-a-look-at-the-odni-cyber-intelligence-study-and-some-early-findings/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</link><description>Well-known asymmetries pit cyber criminals with access to cheap, easy-to-use tools against government and industry organizations that must spend more and more to keep information and assets safe....</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Jared Ettinger</dc:creator><pubDate>Mon, 21 May 2018 00:00:00 -0400</pubDate><guid>https://www.sei.cmu.edu/blog/best-practices-for-cyber-intelligence-a-look-at-the-odni-cyber-intelligence-study-and-some-early-findings/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</guid><category>Cyber Missions</category><category>Cyber Intelligence </category></item></channel></rss>