-
Sep 5th, 2018
ThreatConnect achieves ISO 27001:2013 certification
Continuing our commitment to protect our customers’ data What is ISO 27001? ISO 27001 is an internationally recognized standard defining requirements for a systematic approach to managing sens
-
Aug 31st, 2018
Playbook Fridays: Document Parsing and Keyword Scanning/Tagging
Automatically tag the documents with keywords and focused areas of interest without human intervention ThreatConnect developed the Playbooks capability to help analysts automate time consuming and rep
-
Aug 21st, 2018
How to Choose the Right Threat Intelligence Platform for You
Understand it’s “job” and what you and your team need The first step to choosing the right threat intelligence platform (TIP) for you is to figure out what you actually want the TIP
-
May 18th, 2018
Playbook Fridays: How to Use ThreatConnect Playbooks to Manage Security APIs
Planning for APIs as part of your security architecture This is my first Playbook Friday blog post. I love the ones that the team creates and thought I would try my hand at one. That said, because I a
-
May 11th, 2018
ThreatConnect and the Rise of the Security Developer
Taking Your Team & Career to the Next Level with ThreatConnect’s GitHub Repositories Going to the Next Level with ThreatConnect’s GitHub Repositories When I walk the show floors at RSA
-
May 4th, 2018
Playbook Fridays: Forcing Active Directory (AD) Password Resets via ThreatConnect Victims
Leveraging the Active Directory and ThreatConnect integration to help automate security processes ThreatConnect developed the Playbooks capability to help analysts automate time consuming and repetiti
-
May 3rd, 2018
Introducing ThreatConnect’s Intel Report Cards
Providing insight into how certain feeds are performing within ThreatConnect As part of our latest release, we’ve introduced a new feature to help users better understand the intelligence they
-
Apr 12th, 2018
The Power and Responsibility of Customer Data and Analytics
How ThreatConnect stores, uses, and protects customer data There has been a lot of recent news surrounding compromises in trust where companies purposefully or unintentionally misuse or allow others t
-
Mar 16th, 2018
A Song of Intel and Fancy
A case study tracking adversary infrastructure through SSL certificate use featuring Fancy Bear/APT28/Sofacy. A long time ago, in a galaxy… No. Stop. We’re not doing that anymore. Instead,
-
Feb 9th, 2018
Query a Host or URL Indicator in Archive.org’s Wayback Machine
One-Click querying of the Wayback Machine See if a website has been archived in the Wayback Machine ThreatConnect developed the Playbooks capability to help analysts automate time consuming and repeti
-
Jan 12th, 2018
Playbook Fridays: Using Playbooks to populate custom attributes
Create Custom Attribute Types and Validation Rules, then use Playbooks to populate them automatically I was working with a customer who wanted to use ThreatConnect’s Task and workflow features l
-
Dec 15th, 2017
Playbook Fridays: Task Management
Playbook Fridays: Task Management Simulate a task in ThreatConnect which can be modified to recur daily, weekly, or monthly ThreatConnect developed the Playbooks capability to help analysts automa