Subscribe to the Security@Adobe newsletter
Don’t miss out! Get the latest Adobe security news and exclusive content delivered straight to your inbox.
The cybersecurity industry isn’t short on threat intelligence – it’s overwhelmed by it. Every day, security teams sift through a growing flood of advisories from vendor blogs, Really Simple Syndication (RSS) feeds, premium threat providers, and opensource Indicators of Compromise (IOC) repositories. The challenge is no longer having access to intelligence, but the ability to operationalize it fast enough to reduce real risk.
When a critical advisory is published, security teams are often pushed into a slow, manual process spanning days of work reading reports, extracting indicators, and hunting across multiple tools to determine whether the organization is affected. Meanwhile, attackers are already on the move exploiting the window between intelligence publication and defender action. Fragmented feeds, inconsistent formats, and vendor-specific constraints‑ only widen this gap, making timely, actionable detection one of the hardest challenges in modern security operations.
At Adobe, our Cybersecurity Threat Research & Intelligence (CTRI) team built an AI-powered threat intelligence platform on a Lakehouse architecture to move swiftly and close the gap between intelligence and action.
In this blog, I will demonstrate how security teams can use agentic architecture and AI workflows to transform threat intelligence into timely detection and response at scale.
Rather than building another standalone threat intelligence platform or relying on a single vendor feed, we architected a unified, production-grade orchestration layer on a Lakehouse architecture. This layer ingests threat intelligence from any source, normalizes it into a consistent schema, and automatically hunts across enterprise telemetry in minutes.
At the core of our platform is an agentic security model: instead of relying on analyst hours to manually read advisories, extract indicators, and initiate hunts, AI agents autonomously ingest, interpret, and act on new intelligence as soon as it becomes available. Large language models (LLMs) extract IOCs from unstructured content, regardless of source format or taxonomy, which are then validated, enriched, and used to trigger coordinated hunts across the environment.
Altogether, the platform operates continuously at scale, dramatically reducing the time from intelligence publication to detection and enabling faster, more accurate response to emerging threats.
Once new threat intelligence is published, the platform orchestrates a fully automated flow through the following steps:
By automating the end-to-end flow from intelligence ingestion through detection, this agentic approach reduces reliance on manual processes and enables security teams to operate with greater speed and consistency. The result is a more resilient threat intelligence operation, one that enables detection and response at speed without increasing operational complexity for analysts.
While every organization’s environment is different, the core architectural patterns behind an agentic threat intelligence platform are broadly applicable. Below is a high‑level view of how security teams can approach building a similar system, without relying on a single tool, vendor, or feed:
By grounding the architecture in unified data, AI‑driven interpretation, coordinated workflows, and strong guardrails, security teams can move toward an agentic model that scales with both intelligence volume and operational demands. When introducing agentic detection, running the system alongside existing processes can help teams build trust in autonomous decisions over time, easing the transition from verification to investigation.
Every organization faces the same challenge: an overwhelming volume of threat intelligence and too little time to act on it. By rethinking how existing data infrastructure is used, security teams can connect the tools they already have into a unified, production-grade pipeline that enables agentic, automated operations.
At Adobe, this shift has enabled us to move towards quicker threat detection and intelligence capabilities. The goal isn’t to replace analysts, but to eliminate the repetitive, mechanical work that slows them down, freeing teams to focus on mission-critical investigations and response. Agentic, AI-powered workflows offer a practical path for organizations looking to operationalize threat intelligence at scale and keep pace with a fast-moving threat landscape.
Don’t miss out! Get the latest Adobe security news and exclusive content delivered straight to your inbox.
In this blog, we will provide an overview of this project and share how our findings can help enhance detection capabilities that better protect critical secrets in SMPs.
02-06-2025
To support the broader security community, we are publishing a duo of core research papers on building a purpose-built security data platform.
11-01-2023
In this blog, we’ll describe two add-ons that we are making available as open source to the CrowdStrike community to help scale the solution for other larger organizations.
02-22-2024