Posts
-
Apr 12th, 2023
ThreatConnect 7.1: An Even Better User Experience
ThreatConnect’s 7.1 release delivers an even better ThreatConnect user experience. ThreatConnect 7.1 strengthens capabilities introduced in 7.0, including Enrichment and Reporting, providing more fl
-
Apr 5th, 2023
The 7 Tenets of Threat Intel Operations – Tenet #1: Elevating Threat Intelligence
In the first blog of this series, I took a 30,000-foot view of the 7 Tenets of TI Ops defined in the Dawn of Threat Intelligence Operations paper. In this edition, I’m going to dig into Tenet #1
-
Mar 16th, 2023
The Tenets of Threat Intel Operations
Many organizations struggle to demonstrate value for threat intel and their threat intelligence teams. The intel team is trying to do the right thing though. They are collecting threat intelligence, m
-
Mar 9th, 2023
Uniting the Threat and Risk Intelligence Across ALL Domains
Blog authored by Dave DeWalt, Founder and Managing Director, NightDragon. Read it on the Night Dragon’s website here We live in a true golden age of data and information. Organizations have more
-
Feb 23rd, 2023
The Need for an Evolved Threat Intel Lifecycle
If you’ve seen our blog, “Luke in the Sky with Diamonds,” or have read Adam Shostack’s excellent book: “Threats: What Every Engineer Should Learn From Star Wars,” you know that Star Wars i
-
Jan 18th, 2023
ThreatConnect 7.0: The Industry’s First Threat Intelligence Operations (TI Ops) Platform
A dedicated threat intelligence team and function has been treated as a luxury for far too long, and if there is one, demonstrating its value is a persistent struggle. However, security leaders know t
-
Jan 13th, 2023
Powering Cyber Fusion Operations with ThreatConnect
Cybersecurity technology, processes, and tradecraft are constantly evolving as the attack surface, and vectors expand. It’s no secret that threats are growing faster than defenders can combat them.
-
Dec 14th, 2022
Intelligence-Powered Security Operations Can Propel U.S. Critical Public Infrastructure to Meet New Cybersecurity Performance Goals
The stakes facing USA’s critical public infrastructure organizations in today’s threat environment are higher than ever before. Targeted with an onslaught of relentless attacks and malicious activ
-
Sep 30th, 2022
Cloud-Delivered Cyber Threat Intelligence Platforms Bring Quick Time to Value
If you don’t have a cyber threat intelligence (CTI) platform, then you need one. The challenge is getting your entire security team, from the CSO or CISO to the security and threat-analyst teams in
-
Sep 14th, 2022
Top Malware Strains Used by Threat Actors in 2021 – CISA Alert
Malware continues to grow in sophistication as record numbers of cyberattacks occur worldwide. Malware is often the tip of the spear for threat actors — first, they use it to compromise a computer o
-
Sep 13th, 2022
The Top Security Risks of Remote Working
The pandemic brought major changes to the way organizations work. The rapid adoption of work from anywhere (WFA), completely changed the enterprise cybersecurity landscape. A recent survey, led by I
-
Sep 8th, 2022
Black Hat USA 2022 Cybersecurity Conference Highlights
Black Hat USA, also known as Hacker Summer Camp, was held on August 10-11 at the Mandalay Bay Resort in Las Vegas, marking its 25th anniversary of the conference, and it was great to see everyone in p