Posts
-
Nov 29th, 2023
The Importance of the Diamond Model for Cyber Threat Intelligence
The Diamond Model of Intrusion Analysis (aka the Diamond Model), written by Sergio Caltagirone, Andy Pendergast (co-founder and EVP of Product at ThreatConnect), and Christopher Betz, is a cornerstone
-
Nov 22nd, 2023
Empower Your CTI: A 3-Step Guide to Creating Intelligence Requirements on ThreatConnect’s TI Ops Platform
Cyber Intel Analysis is a growing concern for organizations of all sizes. Staying ahead of evolving digital threats can seem like an impossible task. That’s where ThreatConnect’s TI Ops Platfo
-
Oct 19th, 2023
Looking Forward To Seeing You At SecTor 2023!
We’ll be at SecTor 2023, will you? ThreatConnect is excited to once again be attending SecTor in Toronto, Canada. We are looking forward to catching up with customers and friends, talking about thre
-
Oct 11th, 2023
The Tenets of Threat Intel Operations: Tenet #7 – Measure for Success
In the first blog of this series, I took a 30,000 foot view of the seven tenets of TI Ops defined in the Dawn of Threat Intelligence Operations paper. In this blog, the last in the series, I’m discu
-
Oct 4th, 2023
ThreatConnect 7.3: Leverage the power of Intelligence Requirements and ATT&CK Visualizer
Today, we’re launching version 7.3 of the ThreatConnect TI Ops Platform. This marks an exciting occasion as we roll out this update, delivering substantial enhancements to our customers through a ra
-
Oct 3rd, 2023
The 7 Tenets of Threat Intelligence Operations – Tenet #6: Integrates and Automates Threat Intel
In the first blog of this series, I took a 30,000 foot view of the seven tenets of TI Ops defined in the Dawn of Threat Intelligence Operations paper. In this blog, I’m diving deeper into Tenet 6
-
Sep 28th, 2023
Introducing the ThreatConnect Threat Intelligence Operations Buyers Guide
I’m excited to announce the release of ThreatConnect’s Threat Intelligence Operations Buyers Guide. The need for this type of guide is critical as the adoption of cyber threat intel (CTI) grows, a
-
Sep 27th, 2023
Top 3 User Group Takeaways from ThreatConnect Customers
ThreatConnect hosted four customer user groups in 2023, and we are grateful to our customers for providing invaluable insights. These insights will inform our product roadmap and our users’ shar
-
Sep 26th, 2023
Intelligence-Powered Cybersecurity for State, Local, and Territorial Governments
State, local, and tribal (SLT) governments are responsible for numerous critical services like educating children, providing safe drinking water, delivering safety and emergency services, managing air
-
Sep 21st, 2023
The 7 Tenets of Threat Intelligence Operations – Tenet #5: Automate TI Ops Work
In the first blog of this series, I took a 30,000 foot view of the seven tenets of TI Ops defined in the Dawn of Threat Intelligence Operations paper. In this blog, I’m diving deeper into Tenet 5
-
Sep 20th, 2023
Create Intelligence Requirements in 5 Easy Steps
How to Understand Intelligence Requirements As threat landscapes morph, intelligence requirements have emerged as a vital tool for cyber threat research and analysis. These are topics or research ques
-
Sep 12th, 2023
Top 5 Use Cases for ATT&CK Visualizer
The cybersecurity landscape is complex and fraught with many threats and vulnerabilities. Understanding and navigating this space requires access to up-to-date information on the activities of threat