Posts
-
Jan 25th, 2021
TIP & SOAR: Creating Increased Capability For Less Mature Teams
Building a threat intelligence-led security program with security orchestration, automation, and response (SOAR) capabilities helps to advance your program and gives your company or agency a fighting
-
Jan 18th, 2021
SOAR: Proactive Threat Hunting (Part 2)
There are many definitions for Threat hunting from an active cyber defense activity that proactively and iteratively searches through networks to detect and isolate advanced threats that evade existin
-
Jan 7th, 2021
Former CIA Cybersecurity Chief Speaks Out on Solar Winds Hack
In an exclusive interview with the ThreatConnect Podcast, Robert Bigman, the former Chief Information Security Officer (CISO) at the CIA, said when investigators complete their analysis into how the R
-
Dec 21st, 2020
Why Your SOAR Needs Threat Intel Management, Not Feed Management
When it comes to using threat intelligence to aid in the investigation of alerts or phishing, it’s essential to have the right feeds (whether OSINT or paid). We often get asked, “can I just dump f
-
Dec 17th, 2020
Tactical Threat Hunting (Part 1): Providing the information that matters, when it matters.
This is part 1 of a 2 part series. In a previous article, “SOAR: An Incident Responder’s Best Friend,” we discussed the issues facing Incident Responders today and how Security Orchestration
-
Sep 9th, 2019
Operationalizing Threat Intel: On the Importance of “Boring” Dashboards
This blog post is for boots-on-the-ground security analysts. Managers, turn back now! By the end, you’ll be able to create a tailor-made dashboard in ThreatConnect to help inform your day-to-day act
-
Feb 27th, 2019
5 Things to Do at RSA 2019
Headed to RSA? Here are some ideas of things to do! RSA Conference 2019 is just around the corner! Make the most of your time in San Francisco by filling your time with some classic San Francisco acti
-
Oct 10th, 2018
Top 5 ThreatConnect Resources for Malware Analysis
Malware Analysis. Some may say it’s the most exciting part of the job, right? You have something you know is bad. What’s it do? How’s it run? Where’d it come from? These are qu
-
Nov 7th, 2017
Best Practices for Dashboards in Cybersecurity and Threat Intelligence
Explained Using New ThreatConnect Dashboards There’s no shortage of “dashboards” available in the software world. Walking the floor at any major industry event, it’s hard to
-
Sep 21st, 2017
Track to the Future
How to use historical intelligence to get back to the future and defend your organization We need to talk about something. In the history of this blog, we’ve never discussed Back to the Future.
-
Aug 25th, 2017
Sharing Threat Intelligence Using STIX-TAXII
STIX-TAXII | Learn how to Collect and Send STIX Threat Intelligence in ThreatConnect Sharing threat intelligence and collaborating with your peers, vendors and partners, is not optional to protect you
-
May 8th, 2017
Getting Started with Threat Intelligence: A Guide for the ONG Community
Getting Started with Threat Intelligence: A Guide for the ONG Community How ONG institutions can get started with ThreatConnect to gain context about threats The utilities vertical, specifically oil a