-
Sep 8th, 2022
Black Hat USA 2022 Cybersecurity Conference Highlights
Black Hat USA, also known as Hacker Summer Camp, was held on August 10-11 at the Mandalay Bay Resort in Las Vegas, marking its 25th anniversary of the conference, and it was great to see everyone in p
-
Aug 25th, 2022
5 Steps to Combat Phishing With Intelligence-Powered Security Operations
Did you know there were over 1 million phishing attacks just in Q1 of this year? 1,025,968, to be exact! Phishing attacks are getting more sophisticated and involve more clever ways to entice end user
-
Aug 22nd, 2022
Top 3 Ways To Defend Your Organization – CISA Issues Critical Alert on MedusaLocker Ransomware
The Federal Bureau of Investigation (FBI), the Cybersecurity and Infrastructure Security Agency (CISA), the Department of the Treasury, and the Financial Crimes Enforcement Network (FinCEN) have recen
-
Aug 22nd, 2022
Put Threat Intelligence at the Core of your Security Operations
Threat intelligence teams have a problem, a big data problem due to the velocity, variety, and volume, of the different sets of data they collect. Data comes through non-stop in different forms, from
-
Jan 25th, 2021
TIP & SOAR: Creating Increased Capability For Less Mature Teams
Building a threat intelligence-led security program with security orchestration, automation, and response (SOAR) capabilities helps to advance your program and gives your company or agency a fighting
-
Dec 17th, 2020
Tactical Threat Hunting (Part 1): Providing the information that matters, when it matters.
This is part 1 of a 2 part series. In a previous article, “SOAR: An Incident Responder’s Best Friend,” we discussed the issues facing Incident Responders today and how Security Orchestration
-
Sep 9th, 2019
Operationalizing Threat Intel: On the Importance of “Boring” Dashboards
This blog post is for boots-on-the-ground security analysts. Managers, turn back now! By the end, you’ll be able to create a tailor-made dashboard in ThreatConnect to help inform your day-to-day act
-
Feb 27th, 2019
5 Things to Do at RSA 2019
Headed to RSA? Here are some ideas of things to do! RSA Conference 2019 is just around the corner! Make the most of your time in San Francisco by filling your time with some classic San Francisco acti
-
Oct 10th, 2018
Top 5 ThreatConnect Resources for Malware Analysis
Malware Analysis. Some may say it’s the most exciting part of the job, right? You have something you know is bad. What’s it do? How’s it run? Where’d it come from? These are qu
-
Aug 25th, 2017
Sharing Threat Intelligence Using STIX-TAXII
STIX-TAXII | Learn how to Collect and Send STIX Threat Intelligence in ThreatConnect Sharing threat intelligence and collaborating with your peers, vendors and partners, is not optional to protect you
-
May 8th, 2017
Getting Started with Threat Intelligence: A Guide for the ONG Community
Getting Started with Threat Intelligence: A Guide for the ONG Community How ONG institutions can get started with ThreatConnect to gain context about threats The utilities vertical, specifically oil a
-
Mar 31st, 2017
Getting Started with Threat Intelligence: A Guide for Retailers
How any size retailer can get started with ThreatConnect to gain context about threats Are you a retailer? Just getting started with threat intelligence? Then you are going to want to read this —