The Cycle of Cyber Threat Intelligence