How Threat Intelligence Sharing and Automation Wins the War against Attackers