{
  "$type": "site.standard.document",
  "bskyPostRef": {
    "cid": "bafyreifsodjhx2hsesinb5dvsogmuooozn452c54ynhxfyadby64bivtdy",
    "uri": "at://did:plc:iir655mcoipvnewhnkv6fb3u/app.bsky.feed.post/3mfohsnjcr6q2"
  },
  "coverImage": {
    "$type": "blob",
    "ref": {
      "$link": "bafkreibozkiwhs4gkdkdrqb6ghhxn64onqyi6sgq535pehg2tkim2m3dae"
    },
    "mimeType": "image/png",
    "size": 339279
  },
  "path": "/cybersecurity-blog/threat-monitoring-ti-feeds/",
  "publishedAt": "2026-02-25T10:18:48.000Z",
  "site": "https://any.run",
  "tags": [
    "article"
  ],
  "textContent": "\nBuild intelligence-driven threat monitoring that reduces risk, cuts noise, and strengthens SOC performance.",
  "title": "Turn Your SOC Into a Detection Engine: Rethinking Threat Monitoring"
}