Posts
-
Oct 19th, 2023
Looking Forward To Seeing You At SecTor 2023!
We’ll be at SecTor 2023, will you? ThreatConnect is excited to once again be attending SecTor in Toronto, Canada. We are looking forward to catching up with customers and friends, talking about thre
-
Sep 27th, 2023
Top 3 User Group Takeaways from ThreatConnect Customers
ThreatConnect hosted four customer user groups in 2023, and we are grateful to our customers for providing invaluable insights. These insights will inform our product roadmap and our users’ shar
-
Aug 3rd, 2023
Preparing for Black Hat 2023: How To Stay Safe at One Of The Largest Cybersecurity Conferences
BlackHat 2023 is just around the corner, and before you head out to Vegas, it’s important to ensure your devices are secure and know what to look out for. To help attendees prepare for their sec
-
Sep 8th, 2022
Black Hat USA 2022 Cybersecurity Conference Highlights
Black Hat USA, also known as Hacker Summer Camp, was held on August 10-11 at the Mandalay Bay Resort in Las Vegas, marking its 25th anniversary of the conference, and it was great to see everyone in p
-
Aug 25th, 2022
5 Steps to Combat Phishing With Intelligence-Powered Security Operations
Did you know there were over 1 million phishing attacks just in Q1 of this year? 1,025,968, to be exact! Phishing attacks are getting more sophisticated and involve more clever ways to entice end user
-
Jun 24th, 2022
How Software Vendors Can Leverage Cyber Threat Intelligence for Threat Hunting
In recent years, there’s been an increase in attacks targeted specifically toward enterprise software vendors. Nation-states and cyber-criminal gangs are persistently attacking these organizations w
-
Jun 1st, 2022
Prioritize Attack Analysis and Response With Actionable Intelligence
Analysts are overwhelmed by a number of things: the thousands of alerts they receive in a day, the intricacies of hidden details in email messages, embedded links, and attachments, or the inability to
-
May 19th, 2022
Tactical Threat Hunting – What Is It And How Do You Start?
Alert overload takes the security team’s attention away from many other essential aspects of keeping a healthy cyber ecosystem. Many teams cannot define and implement a threat hunting program becaus
-
May 13th, 2022
The 3 Key Elements of an Effective Cyber Threat Intelligence Program
There is often a conversational disconnect between a cybersecurity team and other departments of an organization. But as cyber is becoming an increasingly large part of business strategy, cybersecurit
-
May 5th, 2022
How To Select The Best SOAR Platform For Your Organization
Information overload is a common challenge facing Security Operations Centers (SOCs). Security analysts are bombarded with hundreds of alerts of potential security events. Sifting through and prioriti
-
Apr 27th, 2022
3 Strategies for Dealing With the Widening Cybersecurity Skills Gap
Many Security Operations Center (SOC) teams are under immense pressure! They’re facing many different challenges and while cybersecurity spending is increasing, investment isn’t always placed wher
-
Apr 22nd, 2022
Why Build A Threat Library?
Cyber threat actors are using more sophisticated tools, techniques, and procedures that are outpacing traditional security solutions. As a result, things such as intrusion detection systems, anti-viru