Posts
-
Jul 30th, 2015
ThreatConnect and Maltego
ThreatConnect® has partnered with Malformity Labs LLC to develop a full transform set that allows for data from ThreatConnect to be integrated with the capabilities of Maltego. All ThreatConnect cust
-
May 26th, 2015
Threat Intelligence Sharing: Empower Your Cyber Defense
I am excited to see threat intelligence sharing is catching on as a way to empower cyber security defenders with timely, relevant, and actionable threat intelligence data. I believe, and I actually
-
Mar 23rd, 2015
Is Your Threat Intelligence Platform Just a Tool?
“If the only tool you have is a hammer, you tend to see every problem as a nail.” Abraham Maslow Throughout the enterprise there are security personnel using a variety of processes and tools to co
-
Feb 15th, 2015
ThreatConnect How To: Pivoting & Exporting Data
Introduction The Diamond Model of Intrusion Analysis is the analytic methodology upon which ThreatConnect is built. Developed by a number of preeminent security researchers and analysts (including o
-
Nov 20th, 2014
ThreatConnect Announces Investment from Grotech Ventures
Today, I’m proud to share that ThreatConnect has announced a $4 Million Series A investment led by Grotech Ventures and other strategic partners. You can read more about the specifics here. Grotech
-
Jun 27th, 2014
Getting the Most out of Crowdsourcing Threat Intelligence
Earlier this week, we saw an article by Robert Ackerman Jr. on Dark Reading about crowdsourced threat intelligence and cyber security. Of course we were excited to see more discussion on threat intell
-
Jun 19th, 2014
How To Streamline Threat Intel Sharing Before Lunch
We saw recently that GCHQ is poised to create a threat intelligence sharing community between public and private organizations in the UK. We applaud this effort and hope that more organizations follow
-
Feb 10th, 2014
Getting “Left of Boom”: How ThreatConnect Enables Proactive Cybersecurity
In the context of the counter improvised explosive device (IED) mission, “left of boom” is what the Washington Post’s Rick Atkinson eluded to when he referenced the moment prior to when an IED e
-
Dec 18th, 2013
ThreatConnect Takes Signature Management to the Next Level
In modern enterprises, signature based threat detection capabilities are still considered a fundamental building block in most network defense strategies. To stay ahead of today’s sophisticated th
-
Nov 7th, 2013
Quickly Assess Maliciousness of Suspicious Activity with “Analyze”
Today’s IT security professionals are faced with mounting piles of log files, suspected malicious email attachments, and malware samples that could provide evidence of an attempted intrusion int
-
Aug 10th, 2010
5 Ways to Make Threat Analysis Actionable
What is Threat Analysis? Learn 5 Ways to Make it Actionable! Lights, Camera, All Quiet on Threats (Set) – Action! – What goes into the creation of your favorite movies? They have a directo