{"id":36103,"date":"2024-03-12T08:00:00","date_gmt":"2024-03-12T14:00:00","guid":{"rendered":"https:\/\/swimlane.com\/?post_type=sw_resource&#038;p=36103"},"modified":"2026-04-06T04:52:34","modified_gmt":"2026-04-06T10:52:34","slug":"automatizacion-de-inteligencia-artificial-sobre-amenazas","status":"publish","type":"sw_resource","link":"https:\/\/swimlane.com\/es\/blog\/ai-automation-threat-intelligence-2\/","title":{"rendered":"Consejos y trucos para la automatizaci\u00f3n de la inteligencia de amenazas mediante IA"},"content":{"rendered":"\n\n\n<section class=\"bs-section bs-section-50ac0cc438dbf2f3b380783c05a3c736bb0670e7 bs-section---default bs-section--blog-inner-banner  \"><style>.bs-section.bs-section-50ac0cc438dbf2f3b380783c05a3c736bb0670e7{ background-color: #000743;} <\/style><div class=\"container\">\n<div class=\"bs-row row  flex-md-row-reverse bs-row---default\">\n<div class=\" bs-column col-sm-12 col-md-12 col-lg-6   bs-column-6770b3369b6c61539d3140cb52ed6bc5ec393625 bs-column---default bs-column--right d-flex flex-column justify-content-end    \"><figure class=\"wp-block-post-featured-image\"><img decoding=\"async\" src=\"https:\/\/swimlane.com\/wp-content\/uploads\/Ai_Tips_Tricks_Masthead.png\" class=\"attachment-post-thumbnail size-post-thumbnail wp-post-image\" alt=\"Threat Intelligence Automation\" style=\"object-fit:cover;\" srcset=\"https:\/\/swimlane.com\/wp-content\/uploads\/\/Ai_Tips_Tricks_Masthead.png 1120w, https:\/\/swimlane.com\/wp-content\/uploads\/\/Ai_Tips_Tricks_Masthead-300x178.png 300w, https:\/\/swimlane.com\/wp-content\/uploads\/\/Ai_Tips_Tricks_Masthead-1024x609.png 1024w, https:\/\/swimlane.com\/wp-content\/uploads\/\/Ai_Tips_Tricks_Masthead-768x457.png 768w\" sizes=\"(max-width: 1120px) 100vw, 1120px\" \/><\/figure><\/div>\n\n\n\n<div class=\" bs-column col-sm-12  col-md-12 col-lg-6   bs-column-2ba18c9b6304620af4785b54fe900bf0ce0fc4d5 bs-column---default d-flex flex-column    \"><div class=\"wp-block-post-date\"><time datetime=\"2024-03-12T08:00:00-06:00\">Mar 12, 2024<\/time><\/div>\n\n<h1 class=\"wp-block-post-title has-text-color has-white-color\">Tips and Tricks for AI Threat Intelligence Automation<\/h1>\n\n\n<div class=\"bs-div bs-div-4c0c357bf69b7e1367afb30b9d59be1945441399 bs-div---default\"><div class=\"bs-div__inner d-flex flex-wrap align-items-center    \">\n<a class=\"bs-post__author has-text-align-center\" href=\"https:\/\/swimlane.com\/es\/author\/Bino_Kohli\/\">\n\t<div class=\"profile-desc\">\n\t\t<figure>\n\t\t\t<img decoding=\"async\" src=\"https:\/\/swimlane.com\/wp-content\/uploads\/Screenshot-2023-09-27-at-2.06.24-PM.png\" alt=\"user-avatar\">\n\t\t<\/figure>\n\t\t<span class=\"prefix\"><\/span>\n\t\t<span class=\"name\">\n\t\t\tBino Kohli\t\t<\/span>\n\t<\/div>\n<\/a>\n\n\n\n<div class=\"reading-time\">\n    <span class=\"reading-time__time\">3 <\/span> Minute Read\n<\/div>\n\n\n<div class=\"wp-block-group\"><div class=\"wp-block-group__inner-container is-layout-constrained wp-block-group-is-layout-constrained\">\n<div class=\"wp-block-columns is-layout-flex wp-container-core-columns-is-layout-9d6595d7 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:100%\">\n<div class=\"wp-block-group\"><div class=\"wp-block-group__inner-container is-layout-constrained wp-block-group-is-layout-constrained\">\n<div class=\"wp-block-group\"><div class=\"wp-block-group__inner-container is-layout-constrained wp-block-group-is-layout-constrained\">\n<div class=\"wp-block-columns is-layout-flex wp-container-core-columns-is-layout-9d6595d7 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:100%\"><\/div>\n<\/div>\n<\/div><\/div>\n<\/div><\/div>\n<\/div>\n<\/div>\n<\/div><\/div>\n<\/div><\/div>\n<\/div>\n<\/div>\n<\/div><\/section>\n\n\n\n\n\n\n\n<section class=\"bs-section bs-section-205a03f93391472c82564395e3b5684e68c8ef7d bs-section---default bs-section--blog-inner-main-contents  \"><div class=\"container\">\n<div class=\"bs-row row justify-content-between  bs-row---default\">\n<div class=\" bs-column col-sm-12 col-md-1   bs-column-fa02c15a19a9c2952663733986e45d4eef708638 bs-column---default     \"><div class=\"heateor_sss_sharing_container heateor_sss_horizontal_sharing\" data-heateor-ss-offset=\"0\" data-heateor-sss-href='https:\/\/swimlane.com\/es\/blog\/ai-automation-threat-intelligence-2\/'><div class=\"heateor_sss_sharing_ul\"><a aria-label=\"Email\" class=\"heateor_sss_email\" href=\"https:\/\/swimlane.com\/es\/blog\/ai-automation-threat-intelligence-2\/\" onclick=\"event.preventDefault();window.open('mailto:?subject=' + decodeURIComponent('Tips%20and%20Tricks%20for%20AI%20Threat%20Intelligence%20Automation').replace('&', '%26') + '&body=https%3A%2F%2Fswimlane.com%2Fes%2Fblog%2Fai-automation-threat-intelligence-2%2F', '_blank')\" title=\"Email\" rel=\"noopener\" style=\"font-size:32px!important;box-shadow:none;display:inline-block;vertical-align:middle\"><span class=\"heateor_sss_svg\" style=\"background-color:#649a3f;width:35px;height:35px;border-radius:999px;display:inline-block;opacity:1;float:left;font-size:32px;box-shadow:none;display:inline-block;font-size:16px;padding:0 4px;vertical-align:middle;background-repeat:repeat;overflow:hidden;padding:0;cursor:pointer;box-sizing:content-box\"><svg style=\"display:block;border-radius:999px;\" focusable=\"false\" aria-hidden=\"true\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"100%\" height=\"100%\" viewBox=\"-.75 -.5 36 36\"><path d=\"M 5.5 11 h 23 v 1 l -11 6 l -11 -6 v -1 m 0 2 l 11 6 l 11 -6 v 11 h -22 v -11\" stroke-width=\"1\" fill=\"#fff\"><\/path><\/svg><\/span><\/a><a aria-label=\"Twitter\" class=\"heateor_sss_button_twitter\" href=\"https:\/\/twitter.com\/intent\/tweet?text=3-Step%20Guide%20to%20Automating%20AI%20Threat%20Intelligence%20%7C%20Swimlane&url=https%3A%2F%2Fswimlane.com%2Fes%2Fblog%2Fai-automation-threat-intelligence-2%2F\" title=\"Twitter\" rel=\"nofollow noopener\" target=\"_blank\" style=\"font-size:32px!important;box-shadow:none;display:inline-block;vertical-align:middle\"><span class=\"heateor_sss_svg heateor_sss_s__default heateor_sss_s_twitter\" style=\"background-color:#55acee;width:35px;height:35px;border-radius:999px;display:inline-block;opacity:1;float:left;font-size:32px;box-shadow:none;display:inline-block;font-size:16px;padding:0 4px;vertical-align:middle;background-repeat:repeat;overflow:hidden;padding:0;cursor:pointer;box-sizing:content-box\"><svg style=\"display:block;border-radius:999px;\" focusable=\"false\" aria-hidden=\"true\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"100%\" height=\"100%\" viewBox=\"-4 -4 39 39\"><path d=\"M28 8.557a9.913 9.913 0 0 1-2.828.775 4.93 4.93 0 0 0 2.166-2.725 9.738 9.738 0 0 1-3.13 1.194 4.92 4.92 0 0 0-3.593-1.55 4.924 4.924 0 0 0-4.794 6.049c-4.09-.21-7.72-2.17-10.15-5.15a4.942 4.942 0 0 0-.665 2.477c0 1.71.87 3.214 2.19 4.1a4.968 4.968 0 0 1-2.23-.616v.06c0 2.39 1.7 4.38 3.952 4.83-.414.115-.85.174-1.297.174-.318 0-.626-.03-.928-.086a4.935 4.935 0 0 0 4.6 3.42 9.893 9.893 0 0 1-6.114 2.107c-.398 0-.79-.023-1.175-.068a13.953 13.953 0 0 0 7.55 2.213c9.056 0 14.01-7.507 14.01-14.013 0-.213-.005-.426-.015-.637.96-.695 1.795-1.56 2.455-2.55z\" fill=\"#fff\"><\/path><\/svg><\/span><\/a><a aria-label=\"Facebook\" class=\"heateor_sss_facebook\" href=\"https:\/\/www.facebook.com\/sharer\/sharer.php?u=https%3A%2F%2Fswimlane.com%2Fes%2Fblog%2Fai-automation-threat-intelligence-2%2F\" title=\"Facebook\" rel=\"nofollow noopener\" target=\"_blank\" style=\"font-size:32px!important;box-shadow:none;display:inline-block;vertical-align:middle\"><span class=\"heateor_sss_svg\" style=\"background-color:#0765FE;width:35px;height:35px;border-radius:999px;display:inline-block;opacity:1;float:left;font-size:32px;box-shadow:none;display:inline-block;font-size:16px;padding:0 4px;vertical-align:middle;background-repeat:repeat;overflow:hidden;padding:0;cursor:pointer;box-sizing:content-box\"><svg style=\"display:block;border-radius:999px;\" focusable=\"false\" aria-hidden=\"true\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"100%\" height=\"100%\" viewBox=\"0 0 32 32\"><path fill=\"#fff\" d=\"M28 16c0-6.627-5.373-12-12-12S4 9.373 4 16c0 5.628 3.875 10.35 9.101 11.647v-7.98h-2.474V16H13.1v-1.58c0-4.085 1.849-5.978 5.859-5.978.76 0 2.072.15 2.608.298v3.325c-.283-.03-.775-.045-1.386-.045-1.967 0-2.728.745-2.728 2.683V16h3.92l-.673 3.667h-3.247v8.245C23.395 27.195 28 22.135 28 16Z\"><\/path><\/svg><\/span><\/a><a aria-label=\"Linkedin\" class=\"heateor_sss_button_linkedin\" href=\"https:\/\/www.linkedin.com\/sharing\/share-offsite\/?url=https%3A%2F%2Fswimlane.com%2Fes%2Fblog%2Fai-automation-threat-intelligence-2%2F\" title=\"Linkedin\" rel=\"nofollow noopener\" target=\"_blank\" style=\"font-size:32px!important;box-shadow:none;display:inline-block;vertical-align:middle\"><span class=\"heateor_sss_svg heateor_sss_s__default heateor_sss_s_linkedin\" style=\"background-color:#0077b5;width:35px;height:35px;border-radius:999px;display:inline-block;opacity:1;float:left;font-size:32px;box-shadow:none;display:inline-block;font-size:16px;padding:0 4px;vertical-align:middle;background-repeat:repeat;overflow:hidden;padding:0;cursor:pointer;box-sizing:content-box\"><svg style=\"display:block;border-radius:999px;\" focusable=\"false\" aria-hidden=\"true\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"100%\" height=\"100%\" viewBox=\"0 0 32 32\"><path d=\"M6.227 12.61h4.19v13.48h-4.19V12.61zm2.095-6.7a2.43 2.43 0 0 1 0 4.86c-1.344 0-2.428-1.09-2.428-2.43s1.084-2.43 2.428-2.43m4.72 6.7h4.02v1.84h.058c.56-1.058 1.927-2.176 3.965-2.176 4.238 0 5.02 2.792 5.02 6.42v7.395h-4.183v-6.56c0-1.564-.03-3.574-2.178-3.574-2.18 0-2.514 1.7-2.514 3.46v6.668h-4.187V12.61z\" fill=\"#fff\"><\/path><\/svg><\/span><\/a><\/div><div class=\"heateorSssClear\"><\/div><\/div>\n<\/div>\n\n\n\n<div class=\" bs-column col-sm-12  col-lg-8 col-md-11   bs-column-0d83d6d9863f92131cc95492d42e5b50c72f00bb bs-column---default bs-column--contents     \">\n<p>Accurate and timely <a href=\"https:\/\/swimlane.com\/blog\/cyber-threat-intelligence\/\">threat intelligence<\/a> is critical for successful <a href=\"https:\/\/swimlane.com\/blog\/what-is-a-security-operations-center-soc\/\">security operations centers.<\/a> In simple terms, threat intelligence can be defined as evidence-based knowledge, including context, indicators, implications, mechanisms, and actionable advice that is related to current or emerging threats to assets. Check out this <a href=\"https:\/\/swimlane.com\/blog\/cyber-threat-intelligence\/\">Automating Threat Intelligence Enrichment blog<\/a> to learn more about what <a href=\"https:\/\/swimlane.com\/blog\/cyber-threat-intelligence\/\">threat intelligence automation<\/a> is, why it is important, and common challenges associated with it.&nbsp;<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Artificial Intelligence and Threat Intelligence<\/h2>\n\n\n\n<p>Much like automation, generative artificial intelligence (AI) is an innovative technology that brings speed and simplicity to any process that it is applied to. Threat detection, intelligence, and prevention are a few of the many cybersecurity functions that are enhanced by the combination of <a href=\"https:\/\/swimlane.com\/blog\/what-automation-has-to-do-with-ai-and-cybersecurity\/\">AI and automation<\/a>.&nbsp;&nbsp;<\/p>\n\n\n\n<p><a href=\"https:\/\/swimlane.com\/swimlane-turbine\/\">Swimlane Turbine<\/a>, the low-code security automation platform, brings this combination to life with the recent introduction of its collection of AI innovations, known as <a href=\"https:\/\/swimlane.com\/platform\/ai\/\">Hero AI<\/a>. One of the founding Hero AI features is a Text-to-Code ChatBot that uses <a href=\"https:\/\/swimlane.com\/resource\/how-turbine-leverages-ai-to-simplify-automation\/(opens%20in%20a%20new%20tab)\">AI to simplify automation development<\/a>.&nbsp; Keep reading this blog to dive deep into a practical Threat Intelligence use case that showcases the effectiveness of Hero AI Text-to-Code capability.&nbsp;<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">3 Steps to Automating Threat Intelligence with AI&nbsp;&nbsp;<\/h2>\n\n\n\n<h3 class=\"wp-block-heading\">Step 1: Determine if the threat is benign or malicious<\/h3>\n\n\n\n<p>Automating threat intelligence begins with data from a threat intelligence tool that provides a numerical score. Once the <a href=\"https:\/\/swimlane.com\/blog\/top-soc-analyst-challenges\/\">SOC analyst<\/a> has this score, their goal is to ascertain the nature of the threat, whether it is malicious or benign.<\/p>\n\n\n\n<p>To accomplish this task, the first step is to submit a query to Hero AI. The query should ask the Text-to-Code assistant something like &#8220;evaluate the score; designate it as &#8216;malicious&#8217; if score exceeds 50, and as &#8216;benign&#8217; if score falls below 50.&#8221;<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"453\" src=\"https:\/\/swimlane.com\/wp-content\/uploads\/Screenshot-2024-03-08-at-2.48.24\u202fPM-1024x453.png\" alt=\"\" class=\"wp-image-36106\" srcset=\"https:\/\/swimlane.com\/wp-content\/uploads\/\/Screenshot-2024-03-08-at-2.48.24\u202fPM-1024x453.png 1024w, https:\/\/swimlane.com\/wp-content\/uploads\/\/Screenshot-2024-03-08-at-2.48.24\u202fPM-300x133.png 300w, https:\/\/swimlane.com\/wp-content\/uploads\/\/Screenshot-2024-03-08-at-2.48.24\u202fPM-768x340.png 768w, https:\/\/swimlane.com\/wp-content\/uploads\/\/Screenshot-2024-03-08-at-2.48.24\u202fPM-1536x679.png 1536w, https:\/\/swimlane.com\/wp-content\/uploads\/\/Screenshot-2024-03-08-at-2.48.24\u202fPM.png 1787w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<p>With a single click, the chat assistant auto-generates the required Python code snippet. The user can seamlessly copy the snippet to the clipboard and even test it directly within the Python action script to explore their outcomes before applying it in playbooks in Turbine. This pre-action testing feature accelerates the building process and eliminates the requirement for manual trial and error.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Step 2: Automate Email Filtering&nbsp;<\/h3>\n\n\n\n<p>From there, the <a href=\"https:\/\/swimlane.com\/blog\/top-soc-analyst-challenges\/\">SOC analyst<\/a> should possess a list of objects representing emails, each comprising &#8216;subject&#8217; and &#8216;body&#8217; fields. Now, the objective is to streamline the list by excluding emails that do not contain specific keywords in the subject. For example, the individual may wish to retain only those emails where the term &#8216;spam&#8217; is present in the subject.<\/p>\n\n\n\n<p>To accomplish this task, query the Hero AI Text-to-Code assistant with a message like \u201cFilter emails by \u2019subject\u2019 key containing word \u2018spam\u2019.\u201d<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"445\" src=\"https:\/\/swimlane.com\/wp-content\/uploads\/Screenshot-2024-03-08-at-2.48.57\u202fPM-1024x445.png\" alt=\"\" class=\"wp-image-36107\" srcset=\"https:\/\/swimlane.com\/wp-content\/uploads\/\/Screenshot-2024-03-08-at-2.48.57\u202fPM-1024x445.png 1024w, https:\/\/swimlane.com\/wp-content\/uploads\/\/Screenshot-2024-03-08-at-2.48.57\u202fPM-300x130.png 300w, https:\/\/swimlane.com\/wp-content\/uploads\/\/Screenshot-2024-03-08-at-2.48.57\u202fPM-768x334.png 768w, https:\/\/swimlane.com\/wp-content\/uploads\/\/Screenshot-2024-03-08-at-2.48.57\u202fPM-1536x668.png 1536w, https:\/\/swimlane.com\/wp-content\/uploads\/\/Screenshot-2024-03-08-at-2.48.57\u202fPM.png 1996w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<h3 class=\"wp-block-heading\">Step 3: Refine Threat Intelligence Filters as Needed&nbsp;<\/h3>\n\n\n\n<p>In the previous example, which filtered emails by a subject containing the word \u2018spam\u2019, the chat assistant provided a ready-to-copy script for the Python script action. Now, there is an additional requirement: filtering emails to include the word &#8216;discount\u2019&#8217; in the body. The chat assistant can generate a script for this purpose as well. This allows for seamless integration of both the \u2018spam\u2019 and \u2018discount\u2019 filters into a single code block as shown above.&nbsp;<\/p>\n\n\n\n<p>This process of refining the script can continue with additional follow-up questions to the extent needed for the specific <a href=\"https:\/\/swimlane.com\/blog\/cyber-threat-intelligence\/\">threat intelligence use cases<\/a>. It just takes a few seconds for Hero AI to incorporate a new bit of logic into the previously generated code.<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"445\" src=\"https:\/\/swimlane.com\/wp-content\/uploads\/Screenshot-2024-03-08-at-2.50.22\u202fPM-1024x445.png\" alt=\"\" class=\"wp-image-36108\" srcset=\"https:\/\/swimlane.com\/wp-content\/uploads\/\/Screenshot-2024-03-08-at-2.50.22\u202fPM-1024x445.png 1024w, https:\/\/swimlane.com\/wp-content\/uploads\/\/Screenshot-2024-03-08-at-2.50.22\u202fPM-300x130.png 300w, https:\/\/swimlane.com\/wp-content\/uploads\/\/Screenshot-2024-03-08-at-2.50.22\u202fPM-768x334.png 768w, https:\/\/swimlane.com\/wp-content\/uploads\/\/Screenshot-2024-03-08-at-2.50.22\u202fPM.png 1293w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<h2 class=\"wp-block-heading\">The Results: 50% Time Savings<\/h2>\n\n\n\n<p>Numerous Swimlane customers have tested this threat intelligence use case with the help of Hero AI Text-to-Code. They experience that the Python scripts are generated, debugged, and tested faster than previously possible with <a href=\"https:\/\/swimlane.com\/swimlane-turbine\/\">Swimlane Turbine<\/a> Hero AI capabilities. On average, customers have reported<strong> 50% time savings.<\/strong> They are now able to <strong>build complete end-to-end use cases in 25 minutes vs 56 minutes.&nbsp;<\/strong><\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"231\" src=\"https:\/\/swimlane.com\/wp-content\/uploads\/50_2_4x-1024x231.png\" alt=\"\" class=\"wp-image-36109\" srcset=\"https:\/\/swimlane.com\/wp-content\/uploads\/\/50_2_4x-1024x231.png 1024w, https:\/\/swimlane.com\/wp-content\/uploads\/\/50_2_4x-300x68.png 300w, https:\/\/swimlane.com\/wp-content\/uploads\/\/50_2_4x-768x173.png 768w, https:\/\/swimlane.com\/wp-content\/uploads\/\/50_2_4x-1536x347.png 1536w, https:\/\/swimlane.com\/wp-content\/uploads\/\/50_2_4x.png 1994w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<p>For a more detailed walkthrough of how to automate threat intelligence with Swimlane Turbine, request a demo <a href=\"https:\/\/swimlane.com\/demo\/\">here<\/a>.&nbsp;     <\/p>\n\n\n\n<div class=\"bs-div bs-div-780504ec595335944e97a5b9e1877653f3fe2723 bs-div---default\"><div class=\"bs-div__inner     \">\n<div class=\"bs-div bs-div-70f36868432952aa9216b7721d0b9405f811095e bs-div---default bs-div--blog-inner-download-guide\"><style>.bs-div.bs-div-70f36868432952aa9216b7721d0b9405f811095e {background-image: url(https:\/\/swimlane.com\/wp-content\/uploads\/2022\/10\/download-report.png); background-position: center center;\n    background-size: cover;} <\/style><div class=\"bs-div__inner d-flex flex-wrap justify-content-center  flex-md-row-reverse align-items-md-center justify-content-md-between flex-md-nowrap  \"><div class='media-elements bs-media-element---default enable'>    <div class='bs-common-image'>\n                            <figure class='figure justify-content-start d-flex'>\n                            <picture>\n                            \n                            <img src='https:\/\/swimlane.com\/wp-content\/uploads\/DragDrop.gif' class='img-fluid'   alt='roi report swimlane security automation' title='' data-gif= \"https:\/\/swimlane.com\/wp-content\/uploads\/DragDrop.gif\" \/>\n                            <\/picture>\n                                \n                            <\/figure>\n                        <\/div><\/div>\n\n\n<div class=\"bs-div bs-div-773aef0a3852274bc6b23f7985e05efd194e399e bs-div---default\"><div class=\"bs-div__inner     \">\n<h3 class=\"wp-block-heading\" id=\"h-request-a-demo\">Request a demo<\/h3>\n\n\n\n<p>If you haven&#8217;t had the chance to explore Swimlane Turbine yet, request a demo.&nbsp;<\/p>\n\n\n\n<span class=\"bs-pro-button bs-pro-button---default bs-pro-button--primary-with-arrow-small bs-pro-button-p-btn-cdfc885ebd52d5653fc9de8946ee15c2fe234d7c\"><style>.bs-pro-button-p-btn-cdfc885ebd52d5653fc9de8946ee15c2fe234d7c .bs-pro-button__container {background-color: #abb8c3; color: #000000;}<\/style><a href=\"https:\/\/swimlane.com\/demo\/\" target=\"_blank\" rel=\"noopener noreferrer\" class=\"bs-pro-button__container\">Request a demo<\/a><\/span>\n<\/div><\/div>\n<\/div><\/div>\n<\/div><\/div>\n<\/div>\n\n\n\n<div class=\" bs-column col-sm-12  col-md-12 col-lg-3   bs-column-0ad64702520e52820989c3b8a4a5574abd826112 bs-column---default     \">\n<div class=\"bs-div bs-div-f0851be86a4542da358c10ec17ccebffa17efe07 bs-div---default bs-div--tags\"><div class=\"bs-div__inner     \">\n<h2 class=\"wp-block-heading\" id=\"h-tags\">Tags<\/h2>\n\n\n<div class=\"post-tag-wrapper\">\n    <p><a href='https:\/\/swimlane.com\/es\/tag\/ai\/'><span class='tag-content'>AI<\/span><\/a><a href='https:\/\/swimlane.com\/es\/tag\/platform\/'><span class='tag-content'>platform<\/span><\/a><\/p><\/div>\n<\/div><\/div>\n\n\n\n<div class=\"bs-div bs-div-5e7267355d8caf36f5b5e0c86eef387b664b848d bs-div---default bs-div--related-posts\"><div class=\"bs-div__inner     \">\n<h2 class=\"wp-block-heading\" id=\"h-related-posts\">Related Posts<\/h2>\n\n\n\n<div class=\"bs-related-posts bs-related-posts-block---default\"><div class=\"bs-related-posts__container\"><div class=\"bs-related-posts__items\">\n<div class=\" bs-column col-sm-4   bs-column-b619eb984092e720779a969a873521d2ec1a85a5 bs-column---default     \">\t\t\t\t\t<div class=\"bs-post bs-post-69e243256eaf0 bs-single-post---default enable\" >\n\t\t\t<a class=\"bs-post__trigger\" href='https:\/\/swimlane.com\/es\/blog\/vulnerability-and-patch-management\/' target='_self'>\t\t\t<div class=\"bs-post__inner\">\n\t\t\t\t<div class=\"bs-post__details\">    <div class=\"bs-post__date\">\n        <span>Mar 3, 2026<\/span>\n    <\/div>\n    <div class=\"bs-post__title\">\n        <h5>Vulnerability Management vs. Patch Management Explained<\/h5>\n    <\/div>\n<div class=\"bs-post__learn-more\">\n    <span class='btn learn-more-text bs-post__learn-more-text'>Read More<\/span><\/div>\n<\/div>\t\t\t<\/div>\n\t\t\t<\/a>\t\t<\/div>\n\t<\/div>\n\n\n\n<div class=\" bs-column col-sm-4   bs-column-b619eb984092e720779a969a873521d2ec1a85a5 bs-column---default     \">\t\t\t\t\t<div class=\"bs-post bs-post-69e243256ffac bs-single-post---default enable\" >\n\t\t\t<a class=\"bs-post__trigger\" href='https:\/\/swimlane.com\/es\/resource\/automation-readiness-maturity-orchestrated-resources-framework\/' target='_self'>\t\t\t<div class=\"bs-post__inner\">\n\t\t\t\t<div class=\"bs-post__details\">    <div class=\"bs-post__date\">\n        <span>Jul 24, 2023<\/span>\n    <\/div>\n    <div class=\"bs-post__title\">\n        <h5>The Swimlane ARMOR Framework<\/h5>\n    <\/div>\n<div class=\"bs-post__learn-more\">\n    <span class='btn learn-more-text bs-post__learn-more-text'>Read More<\/span><\/div>\n<\/div>\t\t\t<\/div>\n\t\t\t<\/a>\t\t<\/div>\n\t<\/div>\n\n\n\n<div class=\" bs-column col-sm-4   bs-column-b619eb984092e720779a969a873521d2ec1a85a5 bs-column---default     \">\t\t\t\t\t<div class=\"bs-post bs-post-69e2432571888 bs-single-post---default enable\" >\n\t\t\t<a class=\"bs-post__trigger\" href='https:\/\/swimlane.com\/es\/blog\/cyber-threat-readiness-should-we-sound-the-alarms\/' target='_self'>\t\t\t<div class=\"bs-post__inner\">\n\t\t\t\t<div class=\"bs-post__details\">    <div class=\"bs-post__date\">\n        <span>Jul 25, 2023<\/span>\n    <\/div>\n    <div class=\"bs-post__title\">\n        <h5>Cyber Threat Readiness: Should We Sound The Alarms?<\/h5>\n    <\/div>\n<div class=\"bs-post__learn-more\">\n    <span class='btn learn-more-text bs-post__learn-more-text'>Read More<\/span><\/div>\n<\/div>\t\t\t<\/div>\n\t\t\t<\/a>\t\t<\/div>\n\t<\/div>\n<\/div><\/div><\/div>\n<\/div><\/div>\n<\/div>\n<\/div>\n<\/div><\/section>\n\n\n\n<section class=\"bs-section bs-section-2a4a600ae9ab197b6a4ccafe05152bf1a2fde1d1 bs-section---default bs-section--newsletter bs-section--common-marketo-form bs-section--common-marketo-form-two-columns  \"><style>.bs-section.bs-section-2a4a600ae9ab197b6a4ccafe05152bf1a2fde1d1{ background-color: #000743;} <\/style><div class=\"container-fluid\">\n<div class=\"bs-row row   bs-row---default\">\n<div class=\" bs-column col-sm-0 col-md-0 col-lg-6   bs-column-df5e10bef85c15055718b4d93887855962017939 bs-column---default     \">\n<h2 class=\"wp-block-heading has-white-color has-text-color\" id=\"requestor\">Request a Live Demo<\/h2>\n<\/div>\n\n\n\n<div class=\" bs-column col-sm-0 col-md-0 col-lg-6   bs-column-df5e10bef85c15055718b4d93887855962017939 bs-column---default     \"><div class='media-elements bs-media-element---default enable'>    <div class='bs-common-image'>\n                            <figure class='figure justify-content-start d-flex'>\n                            <picture>\n                            \n                            <img src='https:\/\/swimlane.com\/wp-content\/uploads\/liitp.svg' class='img-fluid'   alt='' title=''  \/>\n                            <\/picture>\n                                \n                            <\/figure>\n                        <\/div><\/div>\n\n<script src=\"\/\/pages.swimlane.com\/js\/forms2\/js\/forms2.min.js\"><\/script>\n<form id=\"mktoForm_1017\"><\/form>\n<script>\n    var embeddedFormId = '05a6905d0187a23e165b2fd995e965fe15cb94f6';\n    var marketoBaseUrl = '\/\/pages.swimlane.com';\n    var munchkinId = '978-QCM-390';\n    var formId = '1017';\n    var responseType = 'redirect';\n    var responseMessage = 'Thank you!';\n    var redirectURL = '';\n    var downloadFileURL = '';\n    var linkOpenType = '_self';\n    var popupVideo = 'url';\n    var popupVideoURL = '';\n    var popupVideoUploadURL = '';\n    MktoForms2.loadForm(marketoBaseUrl, munchkinId, formId, function(form) {\n        form.onSuccess(function(values, followUpUrl) {\n            document.getElementById(\"int_mktoForm_\" + formId).innerHTML = responseMessage;\n                    });\n    });\n<\/script>\n<div class=\"form-submit-note\" id=\"int_mktoForm_1017\"><\/div>\n<!-- Incluing form response options -->\n\n\n\n<script>\n    (function() {\n        \/\/ Please include the email domains you would like to block in this list\n        var invalidDomains = [\"@gmail.\", \"@yahoo.\", \"@hotmail.\", \"@live.\", \"@icloud.\",\"@aol.\", \"@outlook.\", \"@proton.\", \"@mailinator.\"];\n\n\n        MktoForms2.whenReady(function(form) {\n            form.onValidate(function() {\n                var email = form.vals().Email;\n                if (email) {\n                    if (!isEmailGood(email)) {\n                        form.submitable(false);\n                        var emailElem = form.getFormElem().find(\"#Email\");\n                        form.showErrorMessage(\"Must be Business email.\", emailElem);\n                    } else {\n                        form.submitable(true);\n                    }\n                }\n            });\n        });\n\n        function isEmailGood(email) {\n            for (var i = 0; i < invalidDomains.length; i++) {\n                var domain = invalidDomains[i];\n                if (email.indexOf(domain) != -1) {\n                    return false;\n                }\n            }\n            return true;\n        }\n\n\n    })(); \n<\/script>\n<\/div>\n<\/div>\n<\/div><\/section>\n","protected":false},"excerpt":{"rendered":"","protected":false},"author":69,"featured_media":36104,"template":"","meta":{"_acf_changed":false,"show_custom_date":false,"custom_date":"","featured":false,"featured_image":36104,"learn_more_label":"","image_alt_text":"Automation ","learn_more_type":"","learn_more_link":[],"show_popup":false,"disable_iframe":false,"enable_lazy_loading":false,"learn_more_link_file":0,"event_date":false,"event_start_date":"","event_end_date":"","featured_page_list":[],"_relevanssi_hide_post":"","_relevanssi_hide_content":"","_relevanssi_pin_for_all":"","_relevanssi_pin_keywords":"","_relevanssi_unpin_keywords":"","_relevanssi_related_keywords":"","_relevanssi_related_include_ids":"","_relevanssi_related_exclude_ids":"","_relevanssi_related_no_append":"","_relevanssi_related_not_related":"","_relevanssi_related_posts":"","_relevanssi_noindex_reason":"","inline_featured_image":false,"footnotes":""},"tags":[202,250],"resource-type":[67],"resource-topic":[],"resource-industry":[],"blog-category":[75,72],"class_list":["post-36103","sw_resource","type-sw_resource","status-publish","has-post-thumbnail","hentry","tag-ai","tag-platform","resource-type-blogs","blog-category-security-automation","blog-category-tips-tricks"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v22.5 (Yoast SEO v27.1.1) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>3-Step Guide to Automating AI Threat Intelligence | Swimlane<\/title>\n<meta name=\"description\" content=\"Find out how automating threat Intelligence with AI can allow you to build complete end-to-end use cases in 25 minutes vs 56 minutes with Swimlane.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/swimlane.com\/es\/blog\/inteligencia-de-amenazas-con-automatizacion-de-ia-2\/\" \/>\n<meta property=\"og:locale\" content=\"es_ES\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"3-Step Guide to Automating AI Threat Intelligence | Swimlane\" \/>\n<meta property=\"og:description\" content=\"Find out how automating threat Intelligence with AI can allow you to build complete end-to-end use cases in 25 minutes vs 56 minutes with Swimlane.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/swimlane.com\/es\/blog\/inteligencia-de-amenazas-con-automatizacion-de-ia-2\/\" \/>\n<meta property=\"og:site_name\" content=\"AI Security Automation\" \/>\n<meta property=\"article:modified_time\" content=\"2026-04-06T10:52:34+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/swimlane.com\/wp-content\/uploads\/Ai_Tips_Tricks_Masthead.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1120\" \/>\n\t<meta property=\"og:image:height\" content=\"666\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:title\" content=\"3-Step Guide to Automating AI Threat Intelligence | Swimlane\" \/>\n<meta name=\"twitter:description\" content=\"Find out how automating threat Intelligence with AI can allow you to build complete end-to-end use cases in 25 minutes vs 56 minutes with Swimlane.\" \/>\n<meta name=\"twitter:image\" content=\"https:\/\/swimlane.com\/wp-content\/uploads\/Ai_Tips_Tricks_Masthead.png\" \/>\n<meta name=\"twitter:site\" content=\"@swimlane\" \/>\n<meta name=\"twitter:label1\" content=\"Tiempo de lectura\" \/>\n\t<meta name=\"twitter:data1\" content=\"4 minutos\" \/>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Gu\u00eda de 3 pasos para automatizar la inteligencia artificial sobre amenazas | Swimlane","description":"Descubra c\u00f3mo la automatizaci\u00f3n de la inteligencia sobre amenazas con IA puede permitirle crear casos de uso completos de extremo a extremo en 25 minutos frente a los 56 minutos de Swimlane.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/swimlane.com\/es\/blog\/inteligencia-de-amenazas-con-automatizacion-de-ia-2\/","og_locale":"es_ES","og_type":"article","og_title":"3-Step Guide to Automating AI Threat Intelligence | Swimlane","og_description":"Find out how automating threat Intelligence with AI can allow you to build complete end-to-end use cases in 25 minutes vs 56 minutes with Swimlane.","og_url":"https:\/\/swimlane.com\/es\/blog\/inteligencia-de-amenazas-con-automatizacion-de-ia-2\/","og_site_name":"AI Security Automation","article_modified_time":"2026-04-06T10:52:34+00:00","og_image":[{"width":1120,"height":666,"url":"https:\/\/swimlane.com\/wp-content\/uploads\/Ai_Tips_Tricks_Masthead.png","type":"image\/png"}],"twitter_card":"summary_large_image","twitter_title":"3-Step Guide to Automating AI Threat Intelligence | Swimlane","twitter_description":"Find out how automating threat Intelligence with AI can allow you to build complete end-to-end use cases in 25 minutes vs 56 minutes with Swimlane.","twitter_image":"https:\/\/swimlane.com\/wp-content\/uploads\/Ai_Tips_Tricks_Masthead.png","twitter_site":"@swimlane","twitter_misc":{"Tiempo de lectura":"4 minutos"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/swimlane.com\/es\/blog\/ai-automation-threat-intelligence-2\/","url":"https:\/\/swimlane.com\/es\/blog\/ai-automation-threat-intelligence-2\/","name":"Gu\u00eda de 3 pasos para automatizar la inteligencia artificial sobre amenazas | Swimlane","isPartOf":{"@id":"https:\/\/swimlane.com\/es\/#website"},"primaryImageOfPage":{"@id":"https:\/\/swimlane.com\/es\/blog\/ai-automation-threat-intelligence-2\/#primaryimage"},"image":{"@id":"https:\/\/swimlane.com\/es\/blog\/ai-automation-threat-intelligence-2\/#primaryimage"},"thumbnailUrl":"https:\/\/swimlane.com\/wp-content\/uploads\/Ai_Tips_Tricks_Masthead.png","datePublished":"2024-03-12T14:00:00+00:00","dateModified":"2026-04-06T10:52:34+00:00","description":"Descubra c\u00f3mo la automatizaci\u00f3n de la inteligencia sobre amenazas con IA puede permitirle crear casos de uso completos de extremo a extremo en 25 minutos frente a los 56 minutos de Swimlane.","breadcrumb":{"@id":"https:\/\/swimlane.com\/es\/blog\/ai-automation-threat-intelligence-2\/#breadcrumb"},"inLanguage":"es","potentialAction":[{"@type":"ReadAction","target":["https:\/\/swimlane.com\/es\/blog\/ai-automation-threat-intelligence-2\/"]}]},{"@type":"ImageObject","inLanguage":"es","@id":"https:\/\/swimlane.com\/es\/blog\/ai-automation-threat-intelligence-2\/#primaryimage","url":"https:\/\/swimlane.com\/wp-content\/uploads\/Ai_Tips_Tricks_Masthead.png","contentUrl":"https:\/\/swimlane.com\/wp-content\/uploads\/Ai_Tips_Tricks_Masthead.png","width":1120,"height":666,"caption":"Threat Intelligence Automation"},{"@type":"BreadcrumbList","@id":"https:\/\/swimlane.com\/es\/blog\/ai-automation-threat-intelligence-2\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/swimlane.com\/"},{"@type":"ListItem","position":2,"name":"Tips and Tricks for AI Threat Intelligence Automation"}]},{"@type":"WebSite","@id":"https:\/\/swimlane.com\/es\/#website","url":"https:\/\/swimlane.com\/es\/","name":"Automatizaci\u00f3n de seguridad de c\u00f3digo bajo y plataforma SOAR | Swimlane","description":"Automatizaci\u00f3n de la inteligencia artificial para todas las funciones de seguridad","publisher":{"@id":"https:\/\/swimlane.com\/es\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/swimlane.com\/es\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"es"},{"@type":"Organization","@id":"https:\/\/swimlane.com\/es\/#organization","name":"Automatizaci\u00f3n de seguridad de c\u00f3digo bajo y plataforma SOAR | Swimlane","url":"https:\/\/swimlane.com\/es\/","logo":{"@type":"ImageObject","inLanguage":"es","@id":"https:\/\/swimlane.com\/es\/#\/schema\/logo\/image\/","url":"https:\/\/swimlane.com\/wp-content\/uploads\/sw-inline-logo-color-white.svg","contentUrl":"https:\/\/swimlane.com\/wp-content\/uploads\/sw-inline-logo-color-white.svg","width":912,"height":190,"caption":"Low-Code Security Automation & SOAR Platform | Swimlane"},"image":{"@id":"https:\/\/swimlane.com\/es\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/swimlane","https:\/\/www.linkedin.com\/company\/swimlane\/"]}]}},"publishpress_future_workflow_manual_trigger":{"enabledWorkflows":[]},"_links":{"self":[{"href":"https:\/\/swimlane.com\/es\/wp-json\/wp\/v2\/sw_resource\/36103","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/swimlane.com\/es\/wp-json\/wp\/v2\/sw_resource"}],"about":[{"href":"https:\/\/swimlane.com\/es\/wp-json\/wp\/v2\/types\/sw_resource"}],"author":[{"embeddable":true,"href":"https:\/\/swimlane.com\/es\/wp-json\/wp\/v2\/users\/69"}],"version-history":[{"count":2,"href":"https:\/\/swimlane.com\/es\/wp-json\/wp\/v2\/sw_resource\/36103\/revisions"}],"predecessor-version":[{"id":55536,"href":"https:\/\/swimlane.com\/es\/wp-json\/wp\/v2\/sw_resource\/36103\/revisions\/55536"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/swimlane.com\/es\/wp-json\/wp\/v2\/media\/36104"}],"wp:attachment":[{"href":"https:\/\/swimlane.com\/es\/wp-json\/wp\/v2\/media?parent=36103"}],"wp:term":[{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/swimlane.com\/es\/wp-json\/wp\/v2\/tags?post=36103"},{"taxonomy":"resource-type","embeddable":true,"href":"https:\/\/swimlane.com\/es\/wp-json\/wp\/v2\/resource-type?post=36103"},{"taxonomy":"resource-topic","embeddable":true,"href":"https:\/\/swimlane.com\/es\/wp-json\/wp\/v2\/resource-topic?post=36103"},{"taxonomy":"resource-industry","embeddable":true,"href":"https:\/\/swimlane.com\/es\/wp-json\/wp\/v2\/resource-industry?post=36103"},{"taxonomy":"blog-category","embeddable":true,"href":"https:\/\/swimlane.com\/es\/wp-json\/wp\/v2\/blog-category?post=36103"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}