How to Use Cyber Threat Intelligence to Eliminate Blind Spots