Posts
-
Jul 6th, 2020
Realizing the Benefits of Security Orchestration, Automation, and Response (SOAR)
SAO, TIP, SIRP: Better Together When industry analyst firm Gartner, Inc. coined the term SOAR (Security Orchestration, Automation, and Response), it was because they recognized the benefits innately a
-
Apr 26th, 2019
Introducing ThreatConnect’s Version 5.8
Showcasing the Platform’s increased user flexibility for creating Playbooks and expanded options for in-Platform application (App) building It’s here! Version 5.8 is here: ThreatConnect’s newest
-
Aug 21st, 2018
How to Choose the Right Threat Intelligence Platform for You
Understand it’s “job” and what you and your team need The first step to choosing the right threat intelligence platform (TIP) for you is to figure out what you actually want the TIP
-
Jun 21st, 2017
Getting Started with the ThreatConnect Query Language (TQL)
From Neanderthal to Ninja Users in ThreatConnect have a lot of data to go through, and a big part of our job is finding ways to empower them to find the right data faster. Our Browse Screen harbors an
-
Sep 11th, 2016
Cyber Stratego: Strategic vs. Tactical Threat Intelligence
How You Can Apply Strategic and Tactical Threat Intelligence in ThreatConnect One of the questions we get from users of the ThreatConnect platform is, given an encountered indicator, “what shoul
-
May 16th, 2016
The Best Threat Intelligence Feeds
“What are the best, most important threat intelligence feeds that I should integrate into my security operations?“ What Feeds Me, Destroys Me Seriously, every time I get this question a li
-
Aug 24th, 2015
Why Build Apps in ThreatConnect
Why Build Apps and Share them in ThreatConnect’s TC Exchange™ – Collaborate to Strengthen Your Threat Intelligence Practice If you’ve spoken with anyone here at ThreatConnect, you may have
-
Jan 29th, 2015
ThreatConnect How To: Importing Indicators
There are many advantages to having a centralized Threat Intelligence Platform (TIP) to aggregate, analyze and act on your own threat intelligence. Among them, is empowering the threat analyst to inte