-
Dec 8th, 2016
7 Threat Intelligence Tools Your Team Needs
In today’s world cyber criminals are working hard to constantly come up with new tools, techniques, and procedures to infiltrate networks, socially engineer users and employees, steal money or i
-
Nov 22nd, 2016
How Companies Use ThreatConnect to Make Their Cybersecurity Programs More Efficient: A Use Case
Make Your Cybersecurity Program More Efficient Using ThreatConnect This is the second in a series of blog posts about how organizations are utilizing the ThreatConnect platform. We’re sharing st
-
Nov 17th, 2016
How Companies Use ThreatConnect When Building Their Cybersecurity Program: A Use Case
Build Your Cybersecurity Program Using ThreatConnect This is the first in a series of blog posts about how organizations are utilizing the ThreatConnect platform. We’ll share stories of how customer
-
Nov 2nd, 2016
Step 1: Collect and Correlate Relevant Threat Data
How to Aggregate Relevant Threat Data Is your cybersecurity team small? Or, are you looking to make your team more efficient? It can be difficult to know where to start when you have limited resource
-
Oct 25th, 2016
What is a Cyber Threat? How to Explain Cyber Threats to Your CEO
How to explain cyber threats to your CEO and others. Learn more about the potential for risk. What is a cyber threat? To explain what a cyber threat is to your CEO, you have to remember what your CEO
-
Oct 11th, 2016
How to Manage and Integrate Signatures in ThreatConnect
Signature Management in ThreatConnect ThreatConnect API with SDKs enables users to develop tools that can automate signature generation and integrate signatures into existing security products When mo
-
Sep 11th, 2016
Cyber Stratego: Strategic vs. Tactical Threat Intelligence
How You Can Apply Strategic and Tactical Threat Intelligence in ThreatConnect One of the questions we get from users of the ThreatConnect platform is, given an encountered indicator, “what shoul
-
Sep 2nd, 2016
Can a BEAR Fit Down a Rabbit Hole?
Can a BEAR Fit Down a Rabbit Hole? ThreatConnect Identifies Infrastructure Nexus Between Attacks Against State Election Boards and Spearphishing Campaign Against Turkish, Ukrainian Governments The qu
-
Aug 12th, 2016
Does a BEAR Leak in the Woods?
Identifies DCLeaks As Another Russian-backed Influence Outlet Read the full series of ThreatConnect posts following the DNC Breach: “Rebooting Watergate: Tapping into the Democratic National Co
-
Jul 29th, 2016
FANCY BEAR Has an (IT) Itch that They Can’t Scratch
*This post can also be found on the Fidelis blog, ThreatGeek.* FANCY BEAR Has an (IT) Itch that They Can’t Scratch ThreatConnect and Fidelis team up to explore the Democrati
-
Jul 26th, 2016
Guccifer 2.0: All Roads Lead to Russia
Guccifer 2.0: All Roads Lead to Russia Update 07/26/2016 4:00pm EDT Joe Uchill with The Hill, who has previously covered Guccifer 2.0 and the Wikileaks DNC data dump, has provided us with redacted i
-
Jul 20th, 2016
Guccifer 2.0: the Man, the Myth, the Legend?
Guccifer 2.0: the Man, the Myth, the Legend? ThreatConnect reassesses Guccifer 2.0’s claims in light of his recent public statements Read the full series of ThreatConnect posts following the DNC