Chapter 6: Creating Synergy in Threat Intelligence