{"total":3,"offset":0,"limit":3,"data":[{"thumbnail":"https://www.recordedfuture.com/graphics/datasheet-security-intelligence-solutions-overview-5b42c3713d.jpg","date":"","title":"Threat Intelligence Module","description":"Identify, investigate, and prioritize cyber threats.","link":"https://assets.recordedfuture.com/Datasheets/threat-intelligence.pdf","tags":"Datasheet"},{"thumbnail":"https://www.recordedfuture.com/graphics/reduce-threat-detection-investigation-response-time-hero-mobile-beb07aaa82.png","date":"","title":"Geopolitical Intelligence Module","description":"Identify and monitor physical threats, geopolitical events, and country risk.","link":"https://assets.recordedfuture.com/Datasheets/geopolitical-intelligence-module.pdf","tags":"Datasheet"},{"thumbnail":"https://www.recordedfuture.com/graphics/datasheet-security-intelligence-solutions-overview-5b42c3713d.jpg","date":"","title":"The State of AI + Automation in Threat Intelligence","description":"We partnered with UserEvidence to survey 520+ security executives and analysts on the impact of AI and automation on their threat intelligence programs.","link":"https://pages.recordedfutureext.com/State-of-AI-2025.html","tags":"Report"}],"columns":["thumbnail","date","title","description","link","tags"],":type":"sheet"}