
25 September 2025

Erik Van Dijk
Product Manager Orange Cyberdefense
In Cyber Threat Intelligence (CTI), we often use certain words interchangeably. That might feel harmless, but it can blur what we’re actually doing - and sometimes even cause misunderstandings that could lead to bigger problems.
One of the most common examples is the mix-up between data, information, and intelligence. These are three very different things, yet in CTI we often hear them used side by side, for example:
To get real value out of CTI, it’s important to draw the line between the three. Let’s break it down.
At its most basic, data refers to raw, unprocessed facts. In the context of cybersecurity, data could be anything from an IP address to logfiles or system alerts. It’s like a huge pile of unpolished gems - there’s a lot of it, but alone, it doesn’t tell you much.
For example, a logfile might show you every time a device connects to the network, but it doesn’t tell you whether that connection is normal or suspicious. Data by itself is often of limited utility - it can be just noise without context.
When you start to organize and collate that data into something more meaningful, you get information.
For example, imagine you have a series of logfiles showing a spike in failed login attempts from multiple IPs in a short period. When combined, these individual data points create a pattern, suggesting potential malicious activity, like a brute-force attack.
This is where you’re moving beyond individual facts into something that begins to tell a story. Information provides value because it gives you insights into what might be happening - but it still doesn’t tell you the full picture.
Now, intelligence is where things get serious. Intelligence is derived from the analysis and processing of information. It’s the part that turns raw data into something actionable - and actionable is key as we referred to in our first blog.
Using our example: once you've identified that suspicious spike in log activity, intelligence comes when you contextualize that information with previous incident reports, identify patterns, and add expert analysis. You now know that this type of activity matches previous ransomware attacks.
This is where CTI makes the real impact: you can now make informed decisions about how to respond. Perhaps you block certain IP addresses, alert your team, or even initiate a broader investigation. This is intelligence - not just data, not just information, but insight that drives action.
To recap, here’s how this progression works:
Without this clear journey from data to information to intelligence, your CTI efforts would be like trying to navigate with a map that’s missing half the streets. The value of CTI lies in how it turns raw data into intelligence that helps your organization stay ahead of threats.
Getting this distinction right is more than just semantics. It shows your stakeholder that you know what you are doing and determines whether your CTI program produces noise or value
That’s why this journey is the heart of CTI: it makes sure your team isn’t just collecting facts, but shaping them into insights that help your organization reach its goals.
It also helps us professionalize CTI - step by step, bit by bit - because these are often the low-hanging wins we can deliver quickly so we can focus on the hard(er) parts.
What’s Next
But of course, this transformation we discussed in this blog - from data, to information, to intelligence - doesn’t just happen on its own. It needs to be guided by a structured process. As for example: the intelligence cycle. And that’s exactly what we’ll cover in our next blog.
Let us know what you think or if you had a topic, you would like us to discuss!