Collect information about your cyber reality; monitor your assets, networks, and adversaries.