-
Dec 15th, 2015
Threat Intelligence in 3rd Party Risk Assessment
We’ve finally arrived at the fourth and final installment in this series exploring the relationship between threat intelligence and risk management. If you’re just joining us, previous posts are l
-
Nov 24th, 2015
Best Practices: Indicator Rating and Confidence
ThreatConnect enables users to assign a Threat Rating and Confidence to every single indicator… but what do those numbers really represent? In order to enable your organization to make the bes
-
Oct 16th, 2015
Threat Intelligence-Driven Risk Analysis
Way, way too long ago, we started a series exploring the relationship between threat intelligence and risk management. I’m not sure if a 3+ month gap disqualifies it as a series, but I’ll
-
Sep 18th, 2015
5 Tips For Effective Threat Intelligence
5 Tips For Effective Threat Intelligence See the FULL story 1. Develop a strategy. 2. Choose your threat intelligence platform. 3. Find and hire the right people. (It’s not easy.) 4. Automa
-
Aug 27th, 2015
What’s in a Platform?
The following post will examine the need for organizations to use a Platform to meet the organization’s ever changing security requirements. Unfortunately, the term Platform is an overused ter
-
Aug 24th, 2015
Why Build Apps in ThreatConnect
Why Build Apps and Share them in ThreatConnect’s TC Exchange™ – Collaborate to Strengthen Your Threat Intelligence Practice If you’ve spoken with anyone here at ThreatConnect, you may have
-
Jul 30th, 2015
ThreatConnect and Maltego
ThreatConnect® has partnered with Malformity Labs LLC to develop a full transform set that allows for data from ThreatConnect to be integrated with the capabilities of Maltego. All ThreatConnect cust
-
Jun 29th, 2015
Threat Intelligence within the Risk Management Process
How Threat Intelligence fits within Risk Management This is the second post in a series exploring the relationship of threat intelligence and risk management. If you missed the previous one, wherein
-
Jun 20th, 2015
China Hacks the Peace Palace: All Your EEZ’s Are Belong to Us
Executive Summary In early July 2015, Chinese APT actors used an Adobe Flash Player exploit within a specific webpage detailing a noteworthy international legal case between the Philippines and China.
-
Jun 19th, 2015
Threat Intelligence and Risk Management
Introduction to Threat Intelligence and Risk Management Several of us at ThreatConnect attended the Gartner Security & Risk Management Summit last week, which, conveniently took place right across
-
Jun 9th, 2015
OPM Breach Analysis: Update
As highlighted in our recent webinar with Rick Holland, when there is a security event of great magnitude, organizational leadership will want to know as much as possible about the technical WHAT and
-
Jun 5th, 2015
OPM Breach Analysis
Back in February 2015, the ThreatConnect team conducted in-depth independent analysis of the Anthem breach, finding connections to amorphous Chinese APT activity. Although our primary concern at the t