Posts
-
Feb 15th, 2015
ThreatConnect How To: Pivoting & Exporting Data
Introduction The Diamond Model of Intrusion Analysis is the analytic methodology upon which ThreatConnect is built. Developed by a number of preeminent security researchers and analysts (including o
-
Nov 20th, 2014
ThreatConnect Announces Investment from Grotech Ventures
Today, I’m proud to share that ThreatConnect has announced a $4 Million Series A investment led by Grotech Ventures and other strategic partners. You can read more about the specifics here. Grotech
-
Jun 27th, 2014
Getting the Most out of Crowdsourcing Threat Intelligence
Earlier this week, we saw an article by Robert Ackerman Jr. on Dark Reading about crowdsourced threat intelligence and cyber security. Of course we were excited to see more discussion on threat intell
-
Jun 19th, 2014
How To Streamline Threat Intel Sharing Before Lunch
We saw recently that GCHQ is poised to create a threat intelligence sharing community between public and private organizations in the UK. We applaud this effort and hope that more organizations follow
-
Feb 10th, 2014
Getting “Left of Boom”: How ThreatConnect Enables Proactive Cybersecurity
In the context of the counter improvised explosive device (IED) mission, “left of boom” is what the Washington Post’s Rick Atkinson eluded to when he referenced the moment prior to when an IED e
-
Dec 18th, 2013
ThreatConnect Takes Signature Management to the Next Level
In modern enterprises, signature based threat detection capabilities are still considered a fundamental building block in most network defense strategies. To stay ahead of today’s sophisticated th
-
Nov 7th, 2013
Quickly Assess Maliciousness of Suspicious Activity with “Analyze”
Today’s IT security professionals are faced with mounting piles of log files, suspected malicious email attachments, and malware samples that could provide evidence of an attempted intrusion int
-
Aug 10th, 2010
5 Ways to Make Threat Analysis Actionable
What is Threat Analysis? Learn 5 Ways to Make it Actionable! Lights, Camera, All Quiet on Threats (Set) – Action! – What goes into the creation of your favorite movies? They have a directo