Search results for:
-
Dec 27th, 2022
ThreatConnect’s Intelligence Anywhere Puts Critical Information Within Fast and Easy Reach
In cybersecurity, contextual data is important. Contextual data with speed becomes everything. But many cybersecurity teams are too far away from the critical information they need to make fast and ac
-
Dec 14th, 2022
Intelligence-Powered Security Operations Can Propel U.S. Critical Public Infrastructure to Meet New Cybersecurity Performance Goals
The stakes facing USA’s critical public infrastructure organizations in today’s threat environment are higher than ever before. Targeted with an onslaught of relentless attacks and malicious activ
-
Jun 22nd, 2021
Introducing Playbooks 2.0 and Intelligence Anywhere: Creating a Foundation of Collaboration with ThreatConnect 6.2
ThreatConnect 6.2 introduces Intelligence Anywhere and Playbooks 2.0 for improved ease of use and collaboration. When we think of “collaboration” we usually think about groups of people working to
-
Jun 22nd, 2021
Introducing Playbooks 2.0 and Browser Extension: Creating a Foundation of Collaboration with ThreatConnect 6.2
ThreatConnect 6.2 introduces a new Browser Extension and Playbooks 2.0 for improved ease of use and collaboration. When we think of “collaboration” we usually think about groups of people working
-
Aug 4th, 2020
ThreatConnect and Shodan: Enrich threat data to enhance decision making
ThreatConnect and Shodan have partnered to deliver the Shodan Playbook App. This app allows you to retrieve multiple types of enrichment information for IOCs. Additionally, it allows you to craft cu
-
Jul 7th, 2020
5 Reasons CISOs Need Security Operations, Automation, and Orchestration (SOAR)
At ThreatConnect, we are out to change the way security works by making cybersecurity software that reduces complexity for everyone, makes decision making easy and unifies processes and technology to
-
Jul 6th, 2020
Realizing the Benefits of Security Orchestration, Automation, and Response (SOAR)
SAO, TIP, SIRP: Better Together When industry analyst firm Gartner, Inc. coined the term SOAR (Security Orchestration, Automation, and Response), it was because they recognized the benefits innately a
-
Aug 21st, 2019
CAL™ 2.2 Brings Improved Data Hygiene and More Robust Graph Modeling
Right on the heels of our 2.1 CAL update, we’re keeping up the momentum with the release of CAL 2.2! As a refresher, ThreatConnect’s CAL™ (Collective Analytics Layer) provides anonymized, crowds
-
Apr 26th, 2019
Introducing ThreatConnect’s Version 5.8
Showcasing the Platform’s increased user flexibility for creating Playbooks and expanded options for in-Platform application (App) building It’s here! Version 5.8 is here: ThreatConnect’s newest
-
Aug 21st, 2018
How to Choose the Right Threat Intelligence Platform for You
Understand it’s “job” and what you and your team need The first step to choosing the right threat intelligence platform (TIP) for you is to figure out what you actually want the TIP
-
Jun 21st, 2017
Getting Started with the ThreatConnect Query Language (TQL)
From Neanderthal to Ninja Users in ThreatConnect have a lot of data to go through, and a big part of our job is finding ways to empower them to find the right data faster. Our Browse Screen harbors an
-
Sep 11th, 2016
Cyber Stratego: Strategic vs. Tactical Threat Intelligence
How You Can Apply Strategic and Tactical Threat Intelligence in ThreatConnect One of the questions we get from users of the ThreatConnect platform is, given an encountered indicator, “what shoul