Posts
-
Jan 31st, 2017
Towards Data-Driven Threat Analysis
Make Better Decisions Based on Your Indicators of Compromise A random person on the Internet once said, “Threat Intelligence is a lot more than Intel feeds.” This person was absolutely rig
-
Jan 25th, 2017
Stepping to Fancy Bear
Stepping to FANCY BEAR (or how to efficiently validate and enrich a jumbled list of indicators) Over the last few weeks the U.S. government released two reports on Russian hacking and influence operat
-
Dec 21st, 2016
Do You Make Swords, or Do You Wield Them?
Classifying Analysts: Intelligence Producers and Intelligence Consumers The disciplines of swordsmith and swordsman have been intrinsically linked since the dawn of war. The swordsmith who crafted t
-
Dec 15th, 2016
How Companies Use ThreatConnect To Create a System of Record: A Use Case
This is the third in a series of blog posts about how organizations are utilizing the ThreatConnect platform. We’re going to share stories of how customers just like you have transformed their secur
-
Dec 13th, 2016
Hacktivists vs Faketivists: Fancy Bears in Disguise
What is a faketivist? One of the more surprising stories of 2016 was the Russian effort to shape the outcome of the U.S. presidential election. What surprised us most at ThreatConnect was not Russian
-
Dec 8th, 2016
7 Threat Intelligence Tools Your Team Needs
In today’s world cyber criminals are working hard to constantly come up with new tools, techniques, and procedures to infiltrate networks, socially engineer users and employees, steal money or i
-
Nov 22nd, 2016
How Companies Use ThreatConnect to Make Their Cybersecurity Programs More Efficient: A Use Case
Make Your Cybersecurity Program More Efficient Using ThreatConnect This is the second in a series of blog posts about how organizations are utilizing the ThreatConnect platform. We’re sharing st
-
Nov 17th, 2016
How Companies Use ThreatConnect When Building Their Cybersecurity Program: A Use Case
Build Your Cybersecurity Program Using ThreatConnect This is the first in a series of blog posts about how organizations are utilizing the ThreatConnect platform. We’ll share stories of how customer
-
Nov 2nd, 2016
Step 1: Collect and Correlate Relevant Threat Data
How to Aggregate Relevant Threat Data Is your cybersecurity team small? Or, are you looking to make your team more efficient? It can be difficult to know where to start when you have limited resource
-
Oct 25th, 2016
What is a Cyber Threat? How to Explain Cyber Threats to Your CEO
How to explain cyber threats to your CEO and others. Learn more about the potential for risk. What is a cyber threat? To explain what a cyber threat is to your CEO, you have to remember what your CEO
-
Oct 11th, 2016
How to Manage and Integrate Signatures in ThreatConnect
Signature Management in ThreatConnect ThreatConnect API with SDKs enables users to develop tools that can automate signature generation and integrate signatures into existing security products When mo
-
Sep 11th, 2016
Cyber Stratego: Strategic vs. Tactical Threat Intelligence
How You Can Apply Strategic and Tactical Threat Intelligence in ThreatConnect One of the questions we get from users of the ThreatConnect platform is, given an encountered indicator, “what shoul