Posts
-
May 8th, 2024
Understanding the SEC’s Recent Cybersecurity Regulations
In a recent webinar, Addressing the SEC Requirements for Materiality Disclosure, industry experts shed light on the intricate balance between cybersecurity management and the new regulatory requiremen
-
Dec 20th, 2023
What Is Strategic Risk Quantification?
Authored By: Andrew Dillin, Threat Intelligence Lead – Cyber & Physical at NatWest Group A question posed to me following an earlier LinkedIn post of mine. Is there a good way of working out if
-
Oct 19th, 2023
Looking Forward To Seeing You At SecTor 2023!
We’ll be at SecTor 2023, will you? ThreatConnect is excited to once again be attending SecTor in Toronto, Canada. We are looking forward to catching up with customers and friends, talking about thre
-
Sep 27th, 2023
Top 3 User Group Takeaways from ThreatConnect Customers
ThreatConnect hosted four customer user groups in 2023, and we are grateful to our customers for providing invaluable insights. These insights will inform our product roadmap and our users’ shar
-
Aug 3rd, 2023
Preparing for Black Hat 2023: How To Stay Safe at One Of The Largest Cybersecurity Conferences
BlackHat 2023 is just around the corner, and before you head out to Vegas, it’s important to ensure your devices are secure and know what to look out for. To help attendees prepare for their sec
-
Apr 12th, 2023
ThreatConnect 7.1: An Even Better User Experience
ThreatConnect’s 7.1 release delivers an even better ThreatConnect user experience. ThreatConnect 7.1 strengthens capabilities introduced in 7.0, including Enrichment and Reporting, providing more fl
-
Jan 18th, 2023
ThreatConnect 7.0: The Industry’s First Threat Intelligence Operations (TI Ops) Platform
A dedicated threat intelligence team and function has been treated as a luxury for far too long, and if there is one, demonstrating its value is a persistent struggle. However, security leaders know t
-
Dec 22nd, 2022
Intelligence-Powered Security Operations: Evolve Beyond Traditional SecOps
In the fast-paced, ever-changing cybersecurity landscape today, organizations recognize the need to transform their security operations to achieve greater effectiveness and deliver better protection w
-
Dec 9th, 2022
Healthcare Email Threats are Growing – Combat Them with Phishing Analysis & Response
In recent years, healthcare providers are increasingly being targeted with coordinated, sophisticated Phishing and Business Email Compromise (BEC) campaigns. As these attacks continue to grow, securit
-
Oct 4th, 2022
ProxyNotShell Zero-day Vulnerabilities Exposed
The Latest on ProxyNotShell and How To Respond If You’re Impacted Word is spreading fast about two of the newest zero-day (0-day) vulnerabilities targeting Microsoft Exchange servers, now referred t
-
Sep 8th, 2022
Black Hat USA 2022 Cybersecurity Conference Highlights
Black Hat USA, also known as Hacker Summer Camp, was held on August 10-11 at the Mandalay Bay Resort in Las Vegas, marking its 25th anniversary of the conference, and it was great to see everyone in p
-
Aug 25th, 2022
5 Steps to Combat Phishing With Intelligence-Powered Security Operations
Did you know there were over 1 million phishing attacks just in Q1 of this year? 1,025,968, to be exact! Phishing attacks are getting more sophisticated and involve more clever ways to entice end user