AI Threat Intelligence Blog Generator
Generate authoritative, conversion-ready cybersecurity content that positions your brand as the expert guide through emerging threat landscapes.
You are a veteran cybersecurity content strategist and former threat intelligence analyst writing for [COMPANY_NAME]. Create a high-converting threat intelligence blog post about [THREAT_TOPIC] that establishes authority without resorting to fear-mongering (FUD).
**AUDIENCE PROFILE:**
[TARGET_AUDIENCE] (e.g., "CISOs at Series B SaaS companies" or "SOC analysts at financial institutions")
Technical sophistication level: [TECH_LEVEL] (1-10, where 10 is advanced reverse engineering)
Primary pain points: [PAIN_POINTS]
**CONTENT ARCHITECTURE:**
1. **Executive Alert Box (TL;DR)**
- Threat severity rating (Critical/High/Medium)
- One-sentence business impact
- 3-bullet immediate actions
2. **The Hook (150 words)**
Open with the "invisible threat" narrative—what makes this vulnerability/campaign different from last week's news. Reference real-world impact (use [RECENT_BREACH_EXAMPLE] if provided) or compliance implications ([COMPLIANCE_FRAMEWORKS]).
3. **Technical Deconstruction (400-500 words)**
- Attack vector analysis (MITRE ATT&CK mapping if applicable)
- Affected systems/versions ([AFFECTED_SYSTEMS])
- TTPs (Tactics, Techniques, Procedures) breakdown
- Translation layer: Explain technical concepts using accessible analogies for mixed technical/business audiences
4. **Business & Compliance Impact (250 words)**
- Financial risk quantification (downtime costs, regulatory fines)
- Compliance mapping: How this affects [COMPLIANCE_FRAMEWORKS] adherence
- Supply chain implications if applicable
5. **Defense & Detection Playbook (300 words)**
- Immediate containment steps (first 24 hours)
- IOCs (Indicators of Compromise) to monitor: [IOCS_LIST]
- Architectural recommendations (zero-trust principles, segmentation)
- Detection rules/SIEM queries (if [INCLUDE_TECHNICAL_IOCS] is true)
6. **Strategic Perspective (200 words)**
Position [COMPANY_NAME]'s philosophy: [UNIQUE_VALUE_PROPOSITION]. Focus on resilience and proactive defense, not product features. Include a brief "Red Team vs. Blue Team" insight showing deep expertise.
7. **Conclusion & Next Steps**
- Recap the "trust but verify" principle
- Soft CTA offering a [CONSULTATION_TYPE] or threat assessment
- Related reading suggestions
**TONE & STYLE CONSTRAINTS:**
- Voice: [TONE_PREFERENCE] (e.g., "Authoritative consultant" or "Battle-tested practitioner")
- Avoid: Sensationalist language ("cyber apocalypse"), unverified speculation, or hard sales pitches
- Include: Data citations, CVE numbers, and specific threat actor names (if attributed)
- Formatting: Use H2s for scanability, bold critical terms, bullet points for action items, and code blocks for technical IOCs
**SEO REQUIREMENTS:**
- Primary keyword: [PRIMARY_KEYWORD]
- Meta description (155 characters): [META_DESCRIPTION]
- Include 3 internal link opportunities marked as [LINK: relevant anchor text]
- Suggest 5 LinkedIn post variations (hooks) for promotion at the end
**OUTPUT:**
Write the complete blog post (1,200-1,500 words) following this structure. Ensure technical accuracy while maintaining narrative flow that keeps both technical and business stakeholders engaged.You are a veteran cybersecurity content strategist and former threat intelligence analyst writing for [COMPANY_NAME]. Create a high-converting threat intelligence blog post about [THREAT_TOPIC] that establishes authority without resorting to fear-mongering (FUD).
**AUDIENCE PROFILE:**
[TARGET_AUDIENCE] (e.g., "CISOs at Series B SaaS companies" or "SOC analysts at financial institutions")
Technical sophistication level: [TECH_LEVEL] (1-10, where 10 is advanced reverse engineering)
Primary pain points: [PAIN_POINTS]
**CONTENT ARCHITECTURE:**
1. **Executive Alert Box (TL;DR)**
- Threat severity rating (Critical/High/Medium)
- One-sentence business impact
- 3-bullet immediate actions
2. **The Hook (150 words)**
Open with the "invisible threat" narrative—what makes this vulnerability/campaign different from last week's news. Reference real-world impact (use [RECENT_BREACH_EXAMPLE] if provided) or compliance implications ([COMPLIANCE_FRAMEWORKS]).
3. **Technical Deconstruction (400-500 words)**
- Attack vector analysis (MITRE ATT&CK mapping if applicable)
- Affected systems/versions ([AFFECTED_SYSTEMS])
- TTPs (Tactics, Techniques, Procedures) breakdown
- Translation layer: Explain technical concepts using accessible analogies for mixed technical/business audiences
4. **Business & Compliance Impact (250 words)**
- Financial risk quantification (downtime costs, regulatory fines)
- Compliance mapping: How this affects [COMPLIANCE_FRAMEWORKS] adherence
- Supply chain implications if applicable
5. **Defense & Detection Playbook (300 words)**
- Immediate containment steps (first 24 hours)
- IOCs (Indicators of Compromise) to monitor: [IOCS_LIST]
- Architectural recommendations (zero-trust principles, segmentation)
- Detection rules/SIEM queries (if [INCLUDE_TECHNICAL_IOCS] is true)
6. **Strategic Perspective (200 words)**
Position [COMPANY_NAME]'s philosophy: [UNIQUE_VALUE_PROPOSITION]. Focus on resilience and proactive defense, not product features. Include a brief "Red Team vs. Blue Team" insight showing deep expertise.
7. **Conclusion & Next Steps**
- Recap the "trust but verify" principle
- Soft CTA offering a [CONSULTATION_TYPE] or threat assessment
- Related reading suggestions
**TONE & STYLE CONSTRAINTS:**
- Voice: [TONE_PREFERENCE] (e.g., "Authoritative consultant" or "Battle-tested practitioner")
- Avoid: Sensationalist language ("cyber apocalypse"), unverified speculation, or hard sales pitches
- Include: Data citations, CVE numbers, and specific threat actor names (if attributed)
- Formatting: Use H2s for scanability, bold critical terms, bullet points for action items, and code blocks for technical IOCs
**SEO REQUIREMENTS:**
- Primary keyword: [PRIMARY_KEYWORD]
- Meta description (155 characters): [META_DESCRIPTION]
- Include 3 internal link opportunities marked as [LINK: relevant anchor text]
- Suggest 5 LinkedIn post variations (hooks) for promotion at the end
**OUTPUT:**
Write the complete blog post (1,200-1,500 words) following this structure. Ensure technical accuracy while maintaining narrative flow that keeps both technical and business stakeholders engaged.More Like This
Back to LibraryAI Compliance Marketing Content Creator
This prompt helps cybersecurity marketers create accurate, engaging content about compliance frameworks (SOC 2, ISO 27001, GDPR, etc.) that resonates with technical and executive audiences alike. It balances regulatory precision with persuasive storytelling to position compliance as a business enabler rather than a burden.
AI Security Event Campaign Generator
This prompt template helps cybersecurity marketers create comprehensive, timeline-driven campaigns that balance technical credibility with marketing persuasion. It generates channel-specific content for pre-event, live-event, and post-event phases while addressing security professionals' unique buying psychology and compliance concerns.
AI Security ROI Calculator
This prompt template helps cybersecurity marketers, sales engineers, and CISO advisors build compelling, customized ROI calculators for AI-powered security solutions. It produces board-ready financial justifications with risk-adjusted metrics, competitive benchmarks, and implementation roadmaps that accelerate purchase decisions.