Posts
-
Apr 23rd, 2024
Announcing Our Enhanced Integration with Recorded Future
We are excited to announce an update to the integration between the ThreatConnect Threat Intelligence Operations Platform and Recorded Future! Knowing which adversaries are targeting your organization
-
Apr 4th, 2024
The Role of Cyber Threat Intelligence in Election Security
In the complex game of geopolitics, the digitized world has to contend with cyber threats that don’t conform to conventional rules. Nowhere is this shift more significant than in the sanctity of ele
-
Mar 18th, 2024
Introducing the ThreatConnect Buyer’s Guide for Cyber Risk Quantification Solutions
Cyber attacks have surged to the forefront of significant enterprise risk factors in the modern business landscape. As businesses continue to embrace digital transformations, the resultant increase of
-
Feb 28th, 2024
Announcing A New Integration Between ThreatConnect and Spur
ThreatConnect is excited to announce a new integration with Spur! The integration with Spur’s Context-API allows a range of ThreatConnect users – intel analysts, detection engineers, SOC analy
-
Feb 6th, 2024
2023: An Innovative Year for the ThreatConnect TI Ops Platform
2023 was a banner year for ThreatConnect’s Threat Intelligence Operations Platform. The innovative, market-leading features introduced last year allow CTI teams to: Align to the Evolved Threat Int
-
Dec 1st, 2023
How To Identify The Right Platform For Your Cyber Threat Intel Needs
Cyber threat intel (CTI) teams, and organizations looking to stand up a new CTI function, face a variety of challenges. Many organizations jump into CTI without enough (or any) planning, which leads t
-
Nov 29th, 2023
The Importance of the Diamond Model for Cyber Threat Intelligence
The Diamond Model of Intrusion Analysis (aka the Diamond Model), written by Sergio Caltagirone, Andy Pendergast (co-founder and EVP of Product at ThreatConnect), and Christopher Betz, is a cornerstone
-
Oct 11th, 2023
The Tenets of Threat Intel Operations: Tenet #7 – Measure for Success
In the first blog of this series, I took a 30,000 foot view of the seven tenets of TI Ops defined in the Dawn of Threat Intelligence Operations paper. In this blog, the last in the series, I’m discu
-
Oct 3rd, 2023
The 7 Tenets of Threat Intelligence Operations – Tenet #6: Integrates and Automates Threat Intel
In the first blog of this series, I took a 30,000 foot view of the seven tenets of TI Ops defined in the Dawn of Threat Intelligence Operations paper. In this blog, I’m diving deeper into Tenet 6
-
Sep 28th, 2023
Introducing the ThreatConnect Threat Intelligence Operations Buyers Guide
I’m excited to announce the release of ThreatConnect’s Threat Intelligence Operations Buyers Guide. The need for this type of guide is critical as the adoption of cyber threat intel (CTI) grows, a
-
Sep 26th, 2023
Intelligence-Powered Cybersecurity for State, Local, and Territorial Governments
State, local, and tribal (SLT) governments are responsible for numerous critical services like educating children, providing safe drinking water, delivering safety and emergency services, managing air
-
Sep 21st, 2023
The 7 Tenets of Threat Intelligence Operations – Tenet #5: Automate TI Ops Work
In the first blog of this series, I took a 30,000 foot view of the seven tenets of TI Ops defined in the Dawn of Threat Intelligence Operations paper. In this blog, I’m diving deeper into Tenet 5