How Threat Intelligence Sharing And Automation Wins The War Against Attackers