-
Jun 28th, 2023
Why Threat Intel is Critical for Supply Chain Security
In today’s interconnected world, organizations rely heavily on a complex network of suppliers and vendors critical to their operations. They supply software used across an enterprise and provide
-
Apr 24th, 2023
Zero Trust Steps Up To Shut Down Threat Actors
Over a decade ago, Forrester Research introduced the concept of zero trust. Today, zero trust is considered one of the leading frameworks to guide information and security architects in the design of
-
Apr 12th, 2023
ThreatConnect 7.1: An Even Better User Experience
ThreatConnect’s 7.1 release delivers an even better ThreatConnect user experience. ThreatConnect 7.1 strengthens capabilities introduced in 7.0, including Enrichment and Reporting, providing more fl
-
Apr 5th, 2023
ThreatConnect, Inc Achieves SOC 2 Type 2 Compliance
In partnership with one of the most well-respected independent auditors, Schellman & Company, ThreatConnect has achieved SOC 2 Type 2 compliance with our Dedicated Cloud and Risk Quantifier produc
-
Apr 5th, 2023
The 7 Tenets of Threat Intel Operations – Tenet #1: Elevating Threat Intelligence
In the first blog of this series, I took a 30,000-foot view of the 7 Tenets of TI Ops defined in the Dawn of Threat Intelligence Operations paper. In this edition, I’m going to dig into Tenet #1
-
Mar 16th, 2023
The Tenets of Threat Intel Operations
Many organizations struggle to demonstrate value for threat intel and their threat intelligence teams. The intel team is trying to do the right thing though. They are collecting threat intelligence, m
-
Jan 25th, 2023
It’s 2023, Automating Your Threat Intelligence Operations Doesn’t Have to be Hard
Threat intelligence activities, especially enrichment, analysis, and action, have traditionally required a lot of manual work. Threat Intel Operations analysts are not expected to be coders, spending
-
Jan 18th, 2023
ThreatConnect 7.0: The Industry’s First Threat Intelligence Operations (TI Ops) Platform
A dedicated threat intelligence team and function has been treated as a luxury for far too long, and if there is one, demonstrating its value is a persistent struggle. However, security leaders know t
-
Jan 13th, 2023
Powering Cyber Fusion Operations with ThreatConnect
Cybersecurity technology, processes, and tradecraft are constantly evolving as the attack surface, and vectors expand. It’s no secret that threats are growing faster than defenders can combat them.
-
Dec 13th, 2022
It’s Time to #StopRansomware With Vulnerability Prioritization and Remediation
One of the main tips & guidance from the Cybersecurity and Infrastructure Security Agency (CISA) is to “Keep Calm and Patch On.” CISA emphasizes addressing vulnerabilities twice in this sectio
-
Oct 12th, 2022
Maximize Impact with ThreatConnect 6.7
At ThreatConnect, we enable teams to achieve maximum impact on their security program by improving insights, efficiency, and collaboration. We are continuously building and iterating on our Platform b
-
Sep 20th, 2022
Threat Graph – Seeing is Believing
We all know the saying that, “a picture is worth a thousand words.” It is a fact that people derive meaning faster from imagery and graphics. At our core, humans are visual. Imagery can convey tho