Posts
-
Aug 17th, 2017
ThreatConnect Introduces its Multi-Environment Orchestration Capability
Providing flexibility and scalability to unite all of your security management processes Everyone is talking orchestration these days. Including us. But not one to sit back and let our Playbooks capab
-
Jul 21st, 2017
Finding Nemo(hosts)
How to identify potential malicious infrastructure using ThreatConnect, DomainTools, and more All that is bad is not known Individual indicators are often highly perishable, but understanding the patt
-
Jun 25th, 2017
How to Use Threat Intelligence & Orchestration to Defeat Stranger Threats
Threat Intelligence and Orchestration can come together to defeat threats to your network, or D&D monsters…whichever you face. When watching Stranger Things it’s easy to notice many in
-
Jun 21st, 2017
Getting Started with the ThreatConnect Query Language (TQL)
From Neanderthal to Ninja Users in ThreatConnect have a lot of data to go through, and a big part of our job is finding ways to empower them to find the right data faster. Our Browse Screen harbors an
-
Jun 5th, 2017
Get Started with Cyber Threat Analysis: How to Research Ransomware
Learn How to Research Ransomware in ThreatConnect We recently recorded a video to show what members of our Research Team do on a daily basis within the ThreatConnect platform to perform cyber threat
-
May 23rd, 2017
Did You Know We Have A Knowledge Base?
From guides to training videos and best practices, ThreatConnect’s Knowledge Base has everything you need to use the Platform to its fullest potential. Did you know that ThreatConnect has a know
-
May 2nd, 2017
The Technical Blogs and Reports Source
I’ve got 99 problems, but keeping up with the news isn’t one Collecting is the sort of thing that creeps up on you. ~Paul Mellon “Did you see that latest report on [ransomware
-
Mar 28th, 2017
Save Time and Accomplish More with Playbooks
ThreatConnect Playbook Actions: Be More Efficient and Gain Control with Automated Actions ThreatConnect’s Playbooks feature automates almost any cybersecurity task using an easy drag-and-drop in
-
Jan 31st, 2017
Towards Data-Driven Threat Analysis
Make Better Decisions Based on Your Indicators of Compromise A random person on the Internet once said, “Threat Intelligence is a lot more than Intel feeds.” This person was absolutely rig
-
Dec 15th, 2016
How Companies Use ThreatConnect To Create a System of Record: A Use Case
This is the third in a series of blog posts about how organizations are utilizing the ThreatConnect platform. We’re going to share stories of how customers just like you have transformed their secur
-
Dec 8th, 2016
7 Threat Intelligence Tools Your Team Needs
In today’s world cyber criminals are working hard to constantly come up with new tools, techniques, and procedures to infiltrate networks, socially engineer users and employees, steal money or i
-
Nov 17th, 2016
How Companies Use ThreatConnect When Building Their Cybersecurity Program: A Use Case
Build Your Cybersecurity Program Using ThreatConnect This is the first in a series of blog posts about how organizations are utilizing the ThreatConnect platform. We’ll share stories of how customer