Using the Threat Intelligence Portal to become your own cyberdetective

How an analyst can build a threat intelligence workflow to run effective and complex investigations.