Posts
-
Sep 20th, 2023
Create Intelligence Requirements in 5 Easy Steps
How to Understand Intelligence Requirements As threat landscapes morph, intelligence requirements have emerged as a vital tool for cyber threat research and analysis. These are topics or research ques
-
Jun 7th, 2023
Day in the Life of a TI Analyst Part 2: Dashing Through Dashboards
Welcome back, Class! This is ThreatConnect 101 for CTI analysts featuring me…a former analyst and all-around nerd. If you haven’t seen the first post in this series, I highly recommend checking th
-
Jan 11th, 2023
Day in the Life of a TI Analyst Part 1: ThreatConnect Query Language (TQL) for People Who Don’t Code
Part one of this blog series begins with a simple step-by-step walkthrough of how to craft and save a ThreatConnect Query Language (TQL) query without writing out, or even fully understanding, all of
-
Oct 9th, 2020
How to Use Workflow to do Phishing Analysis Part 1 – Defining the Process
Workflow Refresher Earlier this year, in ThreatConnect 6.0, we released a new feature called Workflow. This capability enables users to define and memorialize processes for teams across the security o