-
Nov 24th, 2015
Best Practices: Indicator Rating and Confidence
ThreatConnect enables users to assign a Threat Rating and Confidence to every single indicator… but what do those numbers really represent? In order to enable your organization to make the bes
-
Oct 16th, 2015
Threat Intelligence-Driven Risk Analysis
Way, way too long ago, we started a series exploring the relationship between threat intelligence and risk management. I’m not sure if a 3+ month gap disqualifies it as a series, but I’ll
-
Sep 18th, 2015
5 Tips For Effective Threat Intelligence
5 Tips For Effective Threat Intelligence See the FULL story 1. Develop a strategy. 2. Choose your threat intelligence platform. 3. Find and hire the right people. (It’s not easy.) 4. Automa
-
Aug 27th, 2015
What’s in a Platform?
The following post will examine the need for organizations to use a Platform to meet the organization’s ever changing security requirements. Unfortunately, the term Platform is an overused ter
-
Aug 24th, 2015
Why Build Apps in ThreatConnect
Why Build Apps and Share them in ThreatConnect’s TC Exchange™ – Collaborate to Strengthen Your Threat Intelligence Practice If you’ve spoken with anyone here at ThreatConnect, you may have
-
Jul 30th, 2015
ThreatConnect and Maltego
ThreatConnect® has partnered with Malformity Labs LLC to develop a full transform set that allows for data from ThreatConnect to be integrated with the capabilities of Maltego. All ThreatConnect cust
-
Jun 29th, 2015
Threat Intelligence within the Risk Management Process
How Threat Intelligence fits within Risk Management This is the second post in a series exploring the relationship of threat intelligence and risk management. If you missed the previous one, wherein
-
Jun 20th, 2015
China Hacks the Peace Palace: All Your EEZ’s Are Belong to Us
Executive Summary In early July 2015, Chinese APT actors used an Adobe Flash Player exploit within a specific webpage detailing a noteworthy international legal case between the Philippines and China.
-
Jun 19th, 2015
Threat Intelligence and Risk Management
Introduction to Threat Intelligence and Risk Management Several of us at ThreatConnect attended the Gartner Security & Risk Management Summit last week, which, conveniently took place right across
-
Jun 9th, 2015
OPM Breach Analysis: Update
As highlighted in our recent webinar with Rick Holland, when there is a security event of great magnitude, organizational leadership will want to know as much as possible about the technical WHAT and
-
Jun 5th, 2015
OPM Breach Analysis
Back in February 2015, the ThreatConnect team conducted in-depth independent analysis of the Anthem breach, finding connections to amorphous Chinese APT activity. Although our primary concern at the t
-
Jun 1st, 2015
Adversary Intelligence: Getting Behind the Keyboard
Arguably one of the most controversial subjects in Threat Intelligence currently is the topic of Attribution, or developing Adversary Intelligence. Industry pundits will debate attribution with a rel