If your organization has ever gotten an alert for “facebook.com” because someone
didn’t vet indicators of compromise properly somewhere along the chain between
threat intelligence generation by a third-party and consumption by your security
infrastructure, you’re not alone.
Facebook might be an extreme example, but it’s