Understanding & Operationalizing Cyber Threat Intelligence