Posts
-
Oct 11th, 2023
The Tenets of Threat Intel Operations: Tenet #7 – Measure for Success
In the first blog of this series, I took a 30,000 foot view of the seven tenets of TI Ops defined in the Dawn of Threat Intelligence Operations paper. In this blog, the last in the series, I’m discu
-
Oct 4th, 2023
ThreatConnect 7.3: Leverage the power of Intelligence Requirements and ATT&CK Visualizer
Today, we’re launching version 7.3 of the ThreatConnect TI Ops Platform. This marks an exciting occasion as we roll out this update, delivering substantial enhancements to our customers through a ra
-
Oct 3rd, 2023
The 7 Tenets of Threat Intelligence Operations – Tenet #6: Integrates and Automates Threat Intel
In the first blog of this series, I took a 30,000 foot view of the seven tenets of TI Ops defined in the Dawn of Threat Intelligence Operations paper. In this blog, I’m diving deeper into Tenet 6
-
Sep 28th, 2023
Introducing the ThreatConnect Threat Intelligence Operations Buyers Guide
I’m excited to announce the release of ThreatConnect’s Threat Intelligence Operations Buyers Guide. The need for this type of guide is critical as the adoption of cyber threat intel (CTI) grows, a
-
Sep 27th, 2023
Top 3 User Group Takeaways from ThreatConnect Customers
ThreatConnect hosted four customer user groups in 2023, and we are grateful to our customers for providing invaluable insights. These insights will inform our product roadmap and our users’ shar
-
Sep 26th, 2023
Intelligence-Powered Cybersecurity for State, Local, and Territorial Governments
State, local, and tribal (SLT) governments are responsible for numerous critical services like educating children, providing safe drinking water, delivering safety and emergency services, managing air
-
Sep 21st, 2023
The 7 Tenets of Threat Intelligence Operations – Tenet #5: Automate TI Ops Work
In the first blog of this series, I took a 30,000 foot view of the seven tenets of TI Ops defined in the Dawn of Threat Intelligence Operations paper. In this blog, I’m diving deeper into Tenet 5
-
Sep 20th, 2023
Create Intelligence Requirements in 5 Easy Steps
How to Understand Intelligence Requirements As threat landscapes morph, intelligence requirements have emerged as a vital tool for cyber threat research and analysis. These are topics or research ques
-
Sep 12th, 2023
Top 5 Use Cases for ATT&CK Visualizer
The cybersecurity landscape is complex and fraught with many threats and vulnerabilities. Understanding and navigating this space requires access to up-to-date information on the activities of threat
-
Aug 29th, 2023
The 7 Tenets of Threat Intelligence Operations – Tenet #4 – Go Beyond IoCs
In the first blog of this series, I took a 30,000 foot view of the seven tenets of TI Ops defined in the Dawn of Threat Intelligence Operations paper. In this blog, I’m diving deeper into Tenet #4 &
-
Aug 24th, 2023
That’s A Wrap From Black Hat USA 2023
Another Black Hat USA is in the books, and we’re already looking forward to 2024. The energy across the event was great, and as always, it was fun to catch up with colleagues, customers, and friends
-
Jul 31st, 2023
The Tenets of Threat Intel Operations – Tenet #3
In the first blog of this series, I took a 30,000-foot view of the seven tenets of TI Ops defined in the Dawn of Threat Intelligence Operations paper. In this blog, I’m diving deeper into Tenet #3 &