Cyber Threat Exchange Logo

Cyber Threat Exchange OpenCTI Workflows

Use Cyber Threat Exchange alongside OpenCTI workflows to publish, subscribe to, and operationalise structured threat intelligence.

Cyber Threat Exchange OpenCTI Workflows

Overview

Cyber Threat Exchange and OpenCTI fit together because both benefit from structured CTI and standards-based movement between systems.

Teams can use TAXII-oriented workflows to publish intelligence from existing platforms into exchange feeds, and consumers can use connector or ingestion paths to bring subscribed exchange data into OpenCTI-oriented environments.

Common uses

  • Publish curated collections from existing CTI tooling into exchange feeds.
  • Import specialist subscribed intelligence into graph-driven CTI operations.
  • Reuse structured CTI across both publication and consumption workflows.