<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" version="2.0">
  <channel>
    <title>EclecticIQ Blog</title>
    <link>https://blog.eclecticiq.com</link>
    <description>Latest on Vulnerability Trends, STIX / TAXII, Beyond the IOC, Ransomware Snapshots, and Threat Analyst enablement</description>
    <language>en-us</language>
    <pubDate>Thu, 26 Mar 2026 14:25:22 GMT</pubDate>
    <dc:date>2026-03-26T14:25:22Z</dc:date>
    <dc:language>en-us</dc:language>
    <item>
      <title>Introducing Intelligence Center 3.7: Faster decisions with clearer context across defense and enterprise</title>
      <link>https://blog.eclecticiq.com/introducing-intelligence-center-3.7</link>
      <description>&lt;p&gt;&lt;span&gt;Counting intelligence outputs is simple: volume, velocity, coverage. The real question is this: does your intelligence improve decisions under pressure, with confidence you can defend?&lt;/span&gt;&lt;span&gt; &lt;/span&gt;&lt;/p&gt;</description>
      <content:encoded>&lt;p&gt;&lt;span&gt;Counting intelligence outputs is simple: volume, velocity, coverage. The real question is this: does your intelligence improve decisions under pressure, with confidence you can defend?&lt;/span&gt;&lt;span&gt; &lt;/span&gt;&lt;/p&gt;  
&lt;img src="https://track.hubspot.com/__ptq.gif?a=2831317&amp;amp;k=14&amp;amp;r=https%3A%2F%2Fblog.eclecticiq.com%2Fintroducing-intelligence-center-3.7&amp;amp;bu=https%253A%252F%252Fblog.eclecticiq.com&amp;amp;bvt=rss" alt="" width="1" height="1" style="min-height:1px!important;width:1px!important;border-width:0!important;margin-top:0!important;margin-bottom:0!important;margin-right:0!important;margin-left:0!important;padding-top:0!important;padding-bottom:0!important;padding-right:0!important;padding-left:0!important; "&gt;</content:encoded>
      <category>Threat Intelligence</category>
      <category>Threat Intelligence Platform</category>
      <category>Product</category>
      <pubDate>Thu, 26 Mar 2026 09:35:12 GMT</pubDate>
      <author>m.karwat@eclecticiq.com (Magdalena Karwat)</author>
      <guid>https://blog.eclecticiq.com/introducing-intelligence-center-3.7</guid>
      <dc:date>2026-03-26T09:35:12Z</dc:date>
    </item>
    <item>
      <title>Free TIP Bundles to test, validate, and operationalize threat intelligence faster</title>
      <link>https://blog.eclecticiq.com/tip-bundles</link>
      <description>&lt;p&gt;&lt;span&gt;You cannot confidently choose threat intelligence integrations and services when you have to commit before you can validate operational impact. That is how you end up with tools that look good on paper, but do not always reduce triage time, improve detection quality, or support response the way you hoped.&lt;/span&gt;&lt;span&gt; &lt;/span&gt;&lt;/p&gt;</description>
      <content:encoded>&lt;p&gt;&lt;span&gt;You cannot confidently choose threat intelligence integrations and services when you have to commit before you can validate operational impact. That is how you end up with tools that look good on paper, but do not always reduce triage time, improve detection quality, or support response the way you hoped.&lt;/span&gt;&lt;span&gt; &lt;/span&gt;&lt;/p&gt;  
&lt;img src="https://track.hubspot.com/__ptq.gif?a=2831317&amp;amp;k=14&amp;amp;r=https%3A%2F%2Fblog.eclecticiq.com%2Ftip-bundles&amp;amp;bu=https%253A%252F%252Fblog.eclecticiq.com&amp;amp;bvt=rss" alt="" width="1" height="1" style="min-height:1px!important;width:1px!important;border-width:0!important;margin-top:0!important;margin-bottom:0!important;margin-right:0!important;margin-left:0!important;padding-top:0!important;padding-bottom:0!important;padding-right:0!important;padding-left:0!important; "&gt;</content:encoded>
      <category>Threat Intelligence</category>
      <category>Threat Intelligence Platform</category>
      <category>Product</category>
      <pubDate>Thu, 26 Mar 2026 09:24:17 GMT</pubDate>
      <author>m.karwat@eclecticiq.com (Magdalena Karwat)</author>
      <guid>https://blog.eclecticiq.com/tip-bundles</guid>
      <dc:date>2026-03-26T09:24:17Z</dc:date>
    </item>
    <item>
      <title>Disarming disinformation: How EclecticIQ helps you analyze and track influence operations with the DISARM Framework</title>
      <link>https://blog.eclecticiq.com/disarm-framework</link>
      <description>&lt;p&gt;&lt;span&gt;Disinformation is no longer just a nuisance.&amp;nbsp;&lt;/span&gt;&lt;span&gt;&amp;nbsp;It’s&amp;nbsp;a weapon&amp;nbsp;leveraged&amp;nbsp;by both state and non-state actors.&lt;/span&gt;&lt;span&gt;&amp;nbsp;&lt;/span&gt;&lt;span&gt;&amp;nbsp;&lt;/span&gt;&lt;span&gt;For information operations analysts tracking influence campaigns across elections, national security threats, and coordinated disinformation efforts, the challenge is growing. Whether you work in a government agency, intelligence service, election security organization, or corporate trust and safety team, the tools at your disposal were not built for this fight.&amp;nbsp;&lt;/span&gt;&lt;span&gt;&amp;nbsp;&lt;/span&gt;&lt;/p&gt;</description>
      <content:encoded>&lt;p&gt;&lt;span&gt;Disinformation is no longer just a nuisance.&amp;nbsp;&lt;/span&gt;&lt;span&gt;&amp;nbsp;It’s&amp;nbsp;a weapon&amp;nbsp;leveraged&amp;nbsp;by both state and non-state actors.&lt;/span&gt;&lt;span&gt;&amp;nbsp;&lt;/span&gt;&lt;span&gt;&amp;nbsp;&lt;/span&gt;&lt;span&gt;For information operations analysts tracking influence campaigns across elections, national security threats, and coordinated disinformation efforts, the challenge is growing. Whether you work in a government agency, intelligence service, election security organization, or corporate trust and safety team, the tools at your disposal were not built for this fight.&amp;nbsp;&lt;/span&gt;&lt;span&gt;&amp;nbsp;&lt;/span&gt;&lt;/p&gt;  
&lt;img src="https://track.hubspot.com/__ptq.gif?a=2831317&amp;amp;k=14&amp;amp;r=https%3A%2F%2Fblog.eclecticiq.com%2Fdisarm-framework&amp;amp;bu=https%253A%252F%252Fblog.eclecticiq.com&amp;amp;bvt=rss" alt="" width="1" height="1" style="min-height:1px!important;width:1px!important;border-width:0!important;margin-top:0!important;margin-bottom:0!important;margin-right:0!important;margin-left:0!important;padding-top:0!important;padding-bottom:0!important;padding-right:0!important;padding-left:0!important; "&gt;</content:encoded>
      <category>Threat Intelligence Platform</category>
      <category>Product</category>
      <category>defence</category>
      <category>cyber security</category>
      <category>desinformation</category>
      <category>DISARM</category>
      <pubDate>Thu, 26 Mar 2026 09:21:59 GMT</pubDate>
      <author>m.karwat@eclecticiq.com (Magdalena Karwat)</author>
      <guid>https://blog.eclecticiq.com/disarm-framework</guid>
      <dc:date>2026-03-26T09:21:59Z</dc:date>
    </item>
    <item>
      <title>Deduplication, done right: Full control, full context, one entity</title>
      <link>https://blog.eclecticiq.com/deduplication</link>
      <description>&lt;p&gt;&lt;span&gt;Threat intelligence teams deal with a constant influx of data from multiple providers, often describing the same threat actor, malware, or vulnerability in slightly&amp;nbsp;different ways. Instead of speeding up analysis, this duplication adds friction and slows decisions.&lt;/span&gt;&lt;span&gt;&amp;nbsp;&lt;/span&gt;&lt;/p&gt;</description>
      <content:encoded>&lt;p&gt;&lt;span&gt;Threat intelligence teams deal with a constant influx of data from multiple providers, often describing the same threat actor, malware, or vulnerability in slightly&amp;nbsp;different ways. Instead of speeding up analysis, this duplication adds friction and slows decisions.&lt;/span&gt;&lt;span&gt;&amp;nbsp;&lt;/span&gt;&lt;/p&gt;  
&lt;img src="https://track.hubspot.com/__ptq.gif?a=2831317&amp;amp;k=14&amp;amp;r=https%3A%2F%2Fblog.eclecticiq.com%2Fdeduplication&amp;amp;bu=https%253A%252F%252Fblog.eclecticiq.com&amp;amp;bvt=rss" alt="" width="1" height="1" style="min-height:1px!important;width:1px!important;border-width:0!important;margin-top:0!important;margin-bottom:0!important;margin-right:0!important;margin-left:0!important;padding-top:0!important;padding-bottom:0!important;padding-right:0!important;padding-left:0!important; "&gt;</content:encoded>
      <category>Threat Intelligence</category>
      <category>Threat Intelligence Platform</category>
      <category>Product</category>
      <category>SOC</category>
      <category>deduplication</category>
      <pubDate>Thu, 26 Mar 2026 09:11:19 GMT</pubDate>
      <author>m.karwat@eclecticiq.com (Magdalena Karwat)</author>
      <guid>https://blog.eclecticiq.com/deduplication</guid>
      <dc:date>2026-03-26T09:11:19Z</dc:date>
    </item>
    <item>
      <title>Mission-ready threat intelligence: Aligning with doctrine through Defense TIP</title>
      <link>https://blog.eclecticiq.com/defense-tip</link>
      <description>&lt;p&gt;&lt;span&gt;&lt;span&gt;The&amp;nbsp;&lt;/span&gt;&lt;span&gt;d&lt;/span&gt;&lt;span&gt;efense&lt;/span&gt;&lt;span&gt;&amp;nbsp;community&lt;/span&gt;&lt;span&gt;&amp;nbsp;deserve&lt;/span&gt;&lt;span&gt;s&lt;/span&gt;&lt;span&gt;&amp;nbsp;a threat intelligence platform that speaks their languag&lt;/span&gt;&lt;span&gt;e&lt;/span&gt;&lt;span&gt;. With our new&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;span&gt;&lt;span&gt;Defense&lt;/span&gt;&lt;span&gt;&amp;nbsp;TIP&lt;/span&gt;&lt;span&gt;&amp;nbsp;mode,&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;span&gt;&lt;span&gt;EclecticIQ&lt;/span&gt;&lt;span&gt;&amp;nbsp;aligns fully with NATO and US military doctrine,&amp;nbsp;&lt;/span&gt;&lt;span&gt;eliminating&lt;/span&gt;&lt;span&gt;&amp;nbsp;the friction caused by mismatched terminology, structure, and limited interoperability with joint and coalition intelligence workflows&lt;/span&gt;&lt;span&gt;.&amp;nbsp;&lt;/span&gt;&lt;span&gt;This is a mission-ready capability built to meet the strategic and operational demands of&amp;nbsp;&lt;/span&gt;&lt;span&gt;modern&amp;nbsp;&lt;/span&gt;&lt;span&gt;defense&lt;/span&gt;&lt;span&gt; intelligence.&lt;/span&gt;&lt;/span&gt;&lt;span&gt;&lt;/span&gt;&lt;/p&gt;</description>
      <content:encoded>&lt;p&gt;&lt;span&gt;&lt;span&gt;The&amp;nbsp;&lt;/span&gt;&lt;span&gt;d&lt;/span&gt;&lt;span&gt;efense&lt;/span&gt;&lt;span&gt;&amp;nbsp;community&lt;/span&gt;&lt;span&gt;&amp;nbsp;deserve&lt;/span&gt;&lt;span&gt;s&lt;/span&gt;&lt;span&gt;&amp;nbsp;a threat intelligence platform that speaks their languag&lt;/span&gt;&lt;span&gt;e&lt;/span&gt;&lt;span&gt;. With our new&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;span&gt;&lt;span&gt;Defense&lt;/span&gt;&lt;span&gt;&amp;nbsp;TIP&lt;/span&gt;&lt;span&gt;&amp;nbsp;mode,&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;span&gt;&lt;span&gt;EclecticIQ&lt;/span&gt;&lt;span&gt;&amp;nbsp;aligns fully with NATO and US military doctrine,&amp;nbsp;&lt;/span&gt;&lt;span&gt;eliminating&lt;/span&gt;&lt;span&gt;&amp;nbsp;the friction caused by mismatched terminology, structure, and limited interoperability with joint and coalition intelligence workflows&lt;/span&gt;&lt;span&gt;.&amp;nbsp;&lt;/span&gt;&lt;span&gt;This is a mission-ready capability built to meet the strategic and operational demands of&amp;nbsp;&lt;/span&gt;&lt;span&gt;modern&amp;nbsp;&lt;/span&gt;&lt;span&gt;defense&lt;/span&gt;&lt;span&gt; intelligence.&lt;/span&gt;&lt;/span&gt;&lt;span&gt;&lt;/span&gt;&lt;/p&gt;  
&lt;img src="https://track.hubspot.com/__ptq.gif?a=2831317&amp;amp;k=14&amp;amp;r=https%3A%2F%2Fblog.eclecticiq.com%2Fdefense-tip&amp;amp;bu=https%253A%252F%252Fblog.eclecticiq.com&amp;amp;bvt=rss" alt="" width="1" height="1" style="min-height:1px!important;width:1px!important;border-width:0!important;margin-top:0!important;margin-bottom:0!important;margin-right:0!important;margin-left:0!important;padding-top:0!important;padding-bottom:0!important;padding-right:0!important;padding-left:0!important; "&gt;</content:encoded>
      <category>Threat Intelligence Platform</category>
      <category>Product</category>
      <category>defence</category>
      <category>cyber security</category>
      <category>TIP</category>
      <category>defense TIP</category>
      <pubDate>Wed, 11 Mar 2026 09:29:59 GMT</pubDate>
      <author>m.karwat@eclecticiq.com (Magdalena Karwat)</author>
      <guid>https://blog.eclecticiq.com/defense-tip</guid>
      <dc:date>2026-03-11T09:29:59Z</dc:date>
    </item>
    <item>
      <title>Europe's Security Capital Deserved Better. So We Got to Work.</title>
      <link>https://blog.eclecticiq.com/europes-security-capital-deserved-better-so-we-got-to-work</link>
      <description>&lt;p&gt;Last summer, a conversation took place between a group of security professionals from EclecticIQ and Booz Allen Hamilton. The topic was straightforward:&amp;nbsp;The Hague is home to NATO, Europol, the Dutch NCSC, and The Hague Security Delta - the largest security cluster in Europe. It is also home to major global enterprises, financial institutions, and critical national infrastructure that represent some of the most significant concentrations of cyber risk on the continent. By any measure, The Hague is one of the most important security hubs in the world. &amp;nbsp;&lt;br&gt;&lt;br&gt;And yet it had no grassroots community event to reflect that status. No accessible, practitioner-led space where the community could come together, share real knowledge, and connect outside of a commercial setting... and notably, no BSides event.&amp;nbsp;&lt;br&gt;&lt;br&gt;The question was simple. Why had nobody done this? What followed was equally simple. &amp;nbsp;&lt;br&gt;&lt;br&gt;We decided we would.&amp;nbsp;&lt;/p&gt;</description>
      <content:encoded>&lt;p&gt;Last summer, a conversation took place between a group of security professionals from EclecticIQ and Booz Allen Hamilton. The topic was straightforward:&amp;nbsp;The Hague is home to NATO, Europol, the Dutch NCSC, and The Hague Security Delta - the largest security cluster in Europe. It is also home to major global enterprises, financial institutions, and critical national infrastructure that represent some of the most significant concentrations of cyber risk on the continent. By any measure, The Hague is one of the most important security hubs in the world. &amp;nbsp;&lt;br&gt;&lt;br&gt;And yet it had no grassroots community event to reflect that status. No accessible, practitioner-led space where the community could come together, share real knowledge, and connect outside of a commercial setting... and notably, no BSides event.&amp;nbsp;&lt;br&gt;&lt;br&gt;The question was simple. Why had nobody done this? What followed was equally simple. &amp;nbsp;&lt;br&gt;&lt;br&gt;We decided we would.&amp;nbsp;&lt;/p&gt;  
&lt;img src="https://track.hubspot.com/__ptq.gif?a=2831317&amp;amp;k=14&amp;amp;r=https%3A%2F%2Fblog.eclecticiq.com%2Feuropes-security-capital-deserved-better-so-we-got-to-work&amp;amp;bu=https%253A%252F%252Fblog.eclecticiq.com&amp;amp;bvt=rss" alt="" width="1" height="1" style="min-height:1px!important;width:1px!important;border-width:0!important;margin-top:0!important;margin-bottom:0!important;margin-right:0!important;margin-left:0!important;padding-top:0!important;padding-bottom:0!important;padding-right:0!important;padding-left:0!important; "&gt;</content:encoded>
      <category>Threat Intelligence</category>
      <category>cyber security</category>
      <category>community</category>
      <pubDate>Wed, 04 Mar 2026 14:14:09 GMT</pubDate>
      <author>a.milne@eclecticiq.com (Andrew Milne)</author>
      <guid>https://blog.eclecticiq.com/europes-security-capital-deserved-better-so-we-got-to-work</guid>
      <dc:date>2026-03-04T14:14:09Z</dc:date>
    </item>
    <item>
      <title>We're at Black Hat Europe</title>
      <link>https://blog.eclecticiq.com/were-at-black-hat-europe</link>
      <description>&lt;p&gt;EclecticIQ is proud to sponsor and exhibit at &lt;strong&gt;Black Hat Europe 2025&lt;/strong&gt;, one of the world’s leading cybersecurity and threat intelligence conferences. This year’s event brings more than &lt;span style="font-weight: normal;"&gt;3,000 security professionals from over 70 countries &lt;/span&gt;to London’s ExCeL for two days of technical briefings, hands-on research, and emerging security insights.&lt;/p&gt;</description>
      <content:encoded>&lt;p&gt;EclecticIQ is proud to sponsor and exhibit at &lt;strong&gt;Black Hat Europe 2025&lt;/strong&gt;, one of the world’s leading cybersecurity and threat intelligence conferences. This year’s event brings more than &lt;span style="font-weight: normal;"&gt;3,000 security professionals from over 70 countries &lt;/span&gt;to London’s ExCeL for two days of technical briefings, hands-on research, and emerging security insights.&lt;/p&gt;  
&lt;img src="https://track.hubspot.com/__ptq.gif?a=2831317&amp;amp;k=14&amp;amp;r=https%3A%2F%2Fblog.eclecticiq.com%2Fwere-at-black-hat-europe&amp;amp;bu=https%253A%252F%252Fblog.eclecticiq.com&amp;amp;bvt=rss" alt="" width="1" height="1" style="min-height:1px!important;width:1px!important;border-width:0!important;margin-top:0!important;margin-bottom:0!important;margin-right:0!important;margin-left:0!important;padding-top:0!important;padding-bottom:0!important;padding-right:0!important;padding-left:0!important; "&gt;</content:encoded>
      <pubDate>Wed, 03 Dec 2025 13:31:15 GMT</pubDate>
      <guid>https://blog.eclecticiq.com/were-at-black-hat-europe</guid>
      <dc:date>2025-12-03T13:31:15Z</dc:date>
      <dc:creator>EclecticIQ</dc:creator>
    </item>
    <item>
      <title>The reality: Bargains bring risk</title>
      <link>https://blog.eclecticiq.com/the-reality-bargains-bring-risk</link>
      <description>&lt;p&gt;&lt;span&gt;From Black Friday to Boxing Day, shopping surges and so do cyber scams. Countdown timers and “last chance” offers create urgency that attackers exploit. &lt;span style="font-weight: bold;"&gt;Every click has consequences &lt;/span&gt;if you’re not prepared.&lt;/span&gt;&lt;span&gt;&amp;nbsp;&lt;/span&gt;&lt;/p&gt;</description>
      <content:encoded>&lt;p&gt;&lt;span&gt;From Black Friday to Boxing Day, shopping surges and so do cyber scams. Countdown timers and “last chance” offers create urgency that attackers exploit. &lt;span style="font-weight: bold;"&gt;Every click has consequences &lt;/span&gt;if you’re not prepared.&lt;/span&gt;&lt;span&gt;&amp;nbsp;&lt;/span&gt;&lt;/p&gt;  
&lt;img src="https://track.hubspot.com/__ptq.gif?a=2831317&amp;amp;k=14&amp;amp;r=https%3A%2F%2Fblog.eclecticiq.com%2Fthe-reality-bargains-bring-risk&amp;amp;bu=https%253A%252F%252Fblog.eclecticiq.com&amp;amp;bvt=rss" alt="" width="1" height="1" style="min-height:1px!important;width:1px!important;border-width:0!important;margin-top:0!important;margin-bottom:0!important;margin-right:0!important;margin-left:0!important;padding-top:0!important;padding-bottom:0!important;padding-right:0!important;padding-left:0!important; "&gt;</content:encoded>
      <pubDate>Mon, 10 Nov 2025 07:26:16 GMT</pubDate>
      <guid>https://blog.eclecticiq.com/the-reality-bargains-bring-risk</guid>
      <dc:date>2025-11-10T07:26:16Z</dc:date>
      <dc:creator>EclecticIQ</dc:creator>
    </item>
    <item>
      <title>Why no business is immune to cyberattacks</title>
      <link>https://blog.eclecticiq.com/why-no-business-is-immune-to-cyberattacks</link>
      <description>&lt;h2&gt;The reality: every organization is a potential target&lt;/h2&gt; 
&lt;p&gt;Cybersecurity is no longer a concern reserved for the world’s largest enterprises or government agencies. In today’s hyperconnected world, every organization — regardless of size, sector, or geography — is a potential target.&lt;/p&gt;</description>
      <content:encoded>&lt;h2&gt;The reality: every organization is a potential target&lt;/h2&gt; 
&lt;p&gt;Cybersecurity is no longer a concern reserved for the world’s largest enterprises or government agencies. In today’s hyperconnected world, every organization — regardless of size, sector, or geography — is a potential target.&lt;/p&gt;  
&lt;img src="https://track.hubspot.com/__ptq.gif?a=2831317&amp;amp;k=14&amp;amp;r=https%3A%2F%2Fblog.eclecticiq.com%2Fwhy-no-business-is-immune-to-cyberattacks&amp;amp;bu=https%253A%252F%252Fblog.eclecticiq.com&amp;amp;bvt=rss" alt="" width="1" height="1" style="min-height:1px!important;width:1px!important;border-width:0!important;margin-top:0!important;margin-bottom:0!important;margin-right:0!important;margin-left:0!important;padding-top:0!important;padding-bottom:0!important;padding-right:0!important;padding-left:0!important; "&gt;</content:encoded>
      <pubDate>Mon, 03 Nov 2025 09:57:03 GMT</pubDate>
      <guid>https://blog.eclecticiq.com/why-no-business-is-immune-to-cyberattacks</guid>
      <dc:date>2025-11-03T09:57:03Z</dc:date>
      <dc:creator>EclecticIQ</dc:creator>
    </item>
    <item>
      <title>EclecticIQ Intelligence Center 3.6: Built for finished intel, custom data modeling, and faster investigations</title>
      <link>https://blog.eclecticiq.com/eclecticiq-intelligence-center-3.6-built-for-finished-intel-custom-data-modeling-and-faster-investigations</link>
      <description>&lt;p&gt;&lt;span&gt;EclecticIQ&lt;/span&gt;&lt;span&gt; Intelligence Center 3.6 &lt;/span&gt;&lt;span&gt;isn’t&lt;/span&gt;&lt;span&gt; just an update - &lt;/span&gt;&lt;span&gt;it’s&lt;/span&gt;&lt;span&gt; a leap forward. With smarter&lt;/span&gt;&lt;span&gt; finished intelligence&lt;/span&gt;&lt;span&gt; reporting, flexible intelligence modelling, and next-level AI features, this release helps &lt;/span&gt;&lt;span&gt;cyber&lt;/span&gt;&lt;span&gt;security &lt;/span&gt;&lt;span&gt;teams move faster, work smarter, and deliver more value across the organization. &lt;/span&gt;&lt;span&gt;Let’s&lt;/span&gt;&lt;span&gt; break down &lt;/span&gt;&lt;span&gt;what’s&lt;/span&gt;&lt;span&gt; new, what it means, and why it matters.&lt;/span&gt;&lt;br&gt;&lt;span&gt;&lt;/span&gt;&lt;/p&gt;</description>
      <content:encoded>&lt;p&gt;&lt;span&gt;EclecticIQ&lt;/span&gt;&lt;span&gt; Intelligence Center 3.6 &lt;/span&gt;&lt;span&gt;isn’t&lt;/span&gt;&lt;span&gt; just an update - &lt;/span&gt;&lt;span&gt;it’s&lt;/span&gt;&lt;span&gt; a leap forward. With smarter&lt;/span&gt;&lt;span&gt; finished intelligence&lt;/span&gt;&lt;span&gt; reporting, flexible intelligence modelling, and next-level AI features, this release helps &lt;/span&gt;&lt;span&gt;cyber&lt;/span&gt;&lt;span&gt;security &lt;/span&gt;&lt;span&gt;teams move faster, work smarter, and deliver more value across the organization. &lt;/span&gt;&lt;span&gt;Let’s&lt;/span&gt;&lt;span&gt; break down &lt;/span&gt;&lt;span&gt;what’s&lt;/span&gt;&lt;span&gt; new, what it means, and why it matters.&lt;/span&gt;&lt;br&gt;&lt;span&gt;&lt;/span&gt;&lt;/p&gt;  
&lt;img src="https://track.hubspot.com/__ptq.gif?a=2831317&amp;amp;k=14&amp;amp;r=https%3A%2F%2Fblog.eclecticiq.com%2Feclecticiq-intelligence-center-3.6-built-for-finished-intel-custom-data-modeling-and-faster-investigations&amp;amp;bu=https%253A%252F%252Fblog.eclecticiq.com&amp;amp;bvt=rss" alt="" width="1" height="1" style="min-height:1px!important;width:1px!important;border-width:0!important;margin-top:0!important;margin-bottom:0!important;margin-right:0!important;margin-left:0!important;padding-top:0!important;padding-bottom:0!important;padding-right:0!important;padding-left:0!important; "&gt;</content:encoded>
      <category>Threat Intelligence Platform</category>
      <category>Product</category>
      <category>Threat investigations</category>
      <category>defence</category>
      <category>cyber security</category>
      <category>TIP</category>
      <category>Release</category>
      <pubDate>Tue, 28 Oct 2025 09:55:22 GMT</pubDate>
      <author>m.karwat@eclecticiq.com (Magdalena Karwat)</author>
      <guid>https://blog.eclecticiq.com/eclecticiq-intelligence-center-3.6-built-for-finished-intel-custom-data-modeling-and-faster-investigations</guid>
      <dc:date>2025-10-28T09:55:22Z</dc:date>
    </item>
  </channel>
</rss>
