Threat Intelligence: How It Informs a Security Program