We get our threats from a number of both internal and external sources.
We also have a partner company that produces threat signatures for a variety of IDS (Intrusion Detection System) and IDP (Intrusion Detection and Prevention) vendors that we use as a source for adding new threats. This same team of security professionals also update threats we use in our vulnerability assessment.