Many cybersecurity organizations consider gathering cyber threat intelligence to be among the most fruitful of cybersecurity activities. Corporate rules of engagement can help organizations avoid being subjected to unnecessary risks when gathering OSINT online.