{
"$type": "site.standard.document",
"bskyPostRef": {
"cid": "bafyreifsodjhx2hsesinb5dvsogmuooozn452c54ynhxfyadby64bivtdy",
"uri": "at://did:plc:iir655mcoipvnewhnkv6fb3u/app.bsky.feed.post/3mfohsnjcr6q2"
},
"coverImage": {
"$type": "blob",
"ref": {
"$link": "bafkreibozkiwhs4gkdkdrqb6ghhxn64onqyi6sgq535pehg2tkim2m3dae"
},
"mimeType": "image/png",
"size": 339279
},
"path": "/cybersecurity-blog/threat-monitoring-ti-feeds/",
"publishedAt": "2026-02-25T10:18:48.000Z",
"site": "https://any.run",
"tags": [
"article"
],
"textContent": "\nBuild intelligence-driven threat monitoring that reduces risk, cuts noise, and strengthens SOC performance.",
"title": "Turn Your SOC Into a Detection Engine: Rethinking Threat Monitoring"
}