-
Mar 28th, 2017
Save Time and Accomplish More with Playbooks
ThreatConnect Playbook Actions: Be More Efficient and Gain Control with Automated Actions ThreatConnect’s Playbooks feature automates almost any cybersecurity task using an easy drag-and-drop in
-
Jan 31st, 2017
Towards Data-Driven Threat Analysis
Make Better Decisions Based on Your Indicators of Compromise A random person on the Internet once said, “Threat Intelligence is a lot more than Intel feeds.” This person was absolutely rig
-
Dec 15th, 2016
How Companies Use ThreatConnect To Create a System of Record: A Use Case
This is the third in a series of blog posts about how organizations are utilizing the ThreatConnect platform. We’re going to share stories of how customers just like you have transformed their secur
-
Dec 8th, 2016
7 Threat Intelligence Tools Your Team Needs
In today’s world cyber criminals are working hard to constantly come up with new tools, techniques, and procedures to infiltrate networks, socially engineer users and employees, steal money or i
-
Nov 17th, 2016
How Companies Use ThreatConnect When Building Their Cybersecurity Program: A Use Case
Build Your Cybersecurity Program Using ThreatConnect This is the first in a series of blog posts about how organizations are utilizing the ThreatConnect platform. We’ll share stories of how customer
-
Oct 11th, 2016
How to Manage and Integrate Signatures in ThreatConnect
Signature Management in ThreatConnect ThreatConnect API with SDKs enables users to develop tools that can automate signature generation and integrate signatures into existing security products When mo
-
Sep 11th, 2016
Cyber Stratego: Strategic vs. Tactical Threat Intelligence
How You Can Apply Strategic and Tactical Threat Intelligence in ThreatConnect One of the questions we get from users of the ThreatConnect platform is, given an encountered indicator, “what shoul
-
Jul 7th, 2016
What’s in a Name Server?
What’s in a Name… Server? That which we call an APT. By any other name would smell as foul. Read the full series of ThreatConnect posts following the DNC Breach: “Rebooting Watergat
-
Apr 28th, 2016
Threat Intelligence and the Downfall of the Galactic Empire
Threat Intelligence and the Downfall of the Galactic Empire ThreatConnect 4.2 Reduces Fragmentation in Your Security Organization As is always the case, Star Wars metaphors can teach us a lot about in
-
Apr 12th, 2016
64 bit Quarian APT Malware
We have developed TIPpers, which are incidents the ThreatConnect Research team flags for your awareness, so your organization can take decisive action. TIPper: 64-bit Quarian APT Malware Details a low
-
Mar 17th, 2016
Sending Aspiring Jedi Knights to Dagobah System
ThreatConnect builds academic partnerships to train the next generation of threat intelligence analysts In The Empire Strikes Back, Luke Skywalker heads to the remote Dagobah system to undergo Jedi tr
-
Feb 29th, 2016
ROI for Threat Intelligence
ThreatConnect 4.1 Incorporates Return on Investment for Threat Intelligence If you have not seen it, Wade Baker, ThreatConnect’s VP Strategy and Risk Analytics, wrote a series of blog posts with the