{
  "$type": "site.standard.document",
  "bskyPostRef": {
    "cid": "bafyreiaapa5lufmaxl2je2mw2djpipadzm6yn66zzoyx7jne334cfbbduq",
    "uri": "at://did:plc:iir655mcoipvnewhnkv6fb3u/app.bsky.feed.post/3mij5a6qofso2"
  },
  "coverImage": {
    "$type": "blob",
    "ref": {
      "$link": "bafkreifl2ijzbhotz47zwijfqpfa2gqx4s776tf7ksg7uqsapzimfjno3m"
    },
    "mimeType": "image/png",
    "size": 897895
  },
  "path": "/cybersecurity-blog/soc-maturity-with-threat-intelligence/",
  "publishedAt": "2026-04-02T10:33:40.000Z",
  "site": "https://any.run",
  "tags": [
    "link"
  ],
  "textContent": "\nTransform your SOC with actionable threat intelligence that connects indicators to behavior, improves decisions, and accelerates detection and response.",
  "title": "From Reactive to Proactive: 5 Steps to SOC Maturity with Threat Intelligence"
}