The document discusses making threat intelligence actionable by recommending responses using STIX. It proposes extending the STIX CourseOfActionType to include specific network actions like block, contain, inspect. Network actions could then be applied automatically or semi-automatically based on indicators in STIX. This would improve the connection between threat detection and response by enabling threat intelligence to recommend standardized, machine-readable responses.