Posts
-
Mar 18th, 2025
Align Your Security Operations with MITRE ATT&CK v16 Using the ThreatConnect ATT&CK Visualizer
Last October, MITRE released ATT&CK v16. In a blog post, the organization described its latest updates as a mission in balance, with the goal of “striking that perfect chord between familiar and
-
Feb 13th, 2025
Debunking Anomali’s Claims: Why ThreatConnect is the Superior Threat Intelligence Platform
As a cybersecurity vendor, I like to take a larger view of the market when it comes to the competition. Competitor or not, we’re all on the same side: fighting the good fight against attackers â
-
Jan 22nd, 2025
Automating Threat Data Retrieval: How ThreatConnect, Polarity, and the TQL Generator are Changing the Game
You’re a CTI Analyst tasked with investigating a potential phishing campaign targeting your organization. An alert flags a suspicious email containing a URL that may be linked to a known threat
-
Jan 9th, 2025
How ThreatConnect and Polarity Empower Teams to Combat Phishing Threats
Phishing remains one of the most effective and pervasive attack methods for cybercriminals, with threats evolving in sophistication and becoming increasingly difficult to detect. To stay ahead, securi
-
Dec 20th, 2024
Navigate ISO 27001:2022 Compliance with ThreatConnect
ISO 27001 has long set the standard for managing information security. Still, the 2022 updates bring a critical shift: organizations must now effectively process and analyze threat intelligence to sta
-
Dec 27th, 2023
8 Questions to Ask a Threat Intelligence Platform Vendor
The threat intelligence (TI) landscape contains a varying number of services and technologies, so finding the right threat intelligence platform can be daunting. Still, this decision is crucial to tur
-
Oct 4th, 2023
ThreatConnect 7.3: Leverage the power of Intelligence Requirements and ATT&CK Visualizer
Today, we’re launching version 7.3 of the ThreatConnect TI Ops Platform. This marks an exciting occasion as we roll out this update, delivering substantial enhancements to our customers through a ra
-
Sep 28th, 2023
Introducing the ThreatConnect Threat Intelligence Operations Buyers Guide
I’m excited to announce the release of ThreatConnect’s Threat Intelligence Operations Buyers Guide. The need for this type of guide is critical as the adoption of cyber threat intel (CTI) grows, a
-
Sep 27th, 2023
Top 3 User Group Takeaways from ThreatConnect Customers
ThreatConnect hosted four customer user groups in 2023, and we are grateful to our customers for providing invaluable insights. These insights will inform our product roadmap and our users’ shar
-
Sep 21st, 2023
The 7 Tenets of Threat Intelligence Operations – Tenet #5: Automate TI Ops Work
In the first blog of this series, I took a 30,000 foot view of the seven tenets of TI Ops defined in the Dawn of Threat Intelligence Operations paper. In this blog, I’m diving deeper into Tenet 5
-
Jun 7th, 2023
Day in the Life of a TI Analyst Part 2: Dashing Through Dashboards
Welcome back, Class! This is ThreatConnect 101 for CTI analysts featuring me…a former analyst and all-around nerd. If you haven’t seen the first post in this series, I highly recommend checking th
-
May 19th, 2023
The 7 Tenets of Threat Intelligence Operations – Tenet #2: Requires an Evolved Threat Intelligence Lifecycle
In the first blog of this series, I took a 30,000-foot view of the seven tenets of TI Ops defined in the Dawn of Threat Intelligence Operations paper. In this edition we are going to dig into Tenet #2