-
Mar 20th, 2023
Balancing the Benefits and Challenges of FAIR – A Practitioner’s View
If you have been a FAIR practitioner for years, like me, or maybe you are just starting out, you may have noticed (or will notice) that FAIR is great for understanding your financial risk exposure, ho
-
Mar 16th, 2023
The Tenets of Threat Intel Operations
Many organizations struggle to demonstrate value for threat intel and their threat intelligence teams. The intel team is trying to do the right thing though. They are collecting threat intelligence, m
-
Jan 25th, 2023
It’s 2023, Automating Your Threat Intelligence Operations Doesn’t Have to be Hard
Threat intelligence activities, especially enrichment, analysis, and action, have traditionally required a lot of manual work. Threat Intel Operations analysts are not expected to be coders, spending
-
Jan 18th, 2023
ThreatConnect 7.0: The Industry’s First Threat Intelligence Operations (TI Ops) Platform
A dedicated threat intelligence team and function has been treated as a luxury for far too long, and if there is one, demonstrating its value is a persistent struggle. However, security leaders know t
-
Jan 13th, 2023
Powering Cyber Fusion Operations with ThreatConnect
Cybersecurity technology, processes, and tradecraft are constantly evolving as the attack surface, and vectors expand. It’s no secret that threats are growing faster than defenders can combat them.
-
Jan 11th, 2023
Day in the Life of a TI Analyst Part 1: ThreatConnect Query Language (TQL) for People Who Don’t Code
Part one of this blog series begins with a simple step-by-step walkthrough of how to craft and save a ThreatConnect Query Language (TQL) query without writing out, or even fully understanding, all of
-
Dec 27th, 2022
ThreatConnect’s Intelligence Anywhere Puts Critical Information Within Fast and Easy Reach
In cybersecurity, contextual data is important. Contextual data with speed becomes everything. But many cybersecurity teams are too far away from the critical information they need to make fast and ac
-
Dec 13th, 2022
It’s Time to #StopRansomware With Vulnerability Prioritization and Remediation
One of the main tips & guidance from the Cybersecurity and Infrastructure Security Agency (CISA) is to “Keep Calm and Patch On.” CISA emphasizes addressing vulnerabilities twice in this sectio
-
Oct 12th, 2022
Maximize Impact with ThreatConnect 6.7
At ThreatConnect, we enable teams to achieve maximum impact on their security program by improving insights, efficiency, and collaboration. We are continuously building and iterating on our Platform b
-
Oct 4th, 2022
ProxyNotShell Zero-day Vulnerabilities Exposed
The Latest on ProxyNotShell and How To Respond If You’re Impacted Word is spreading fast about two of the newest zero-day (0-day) vulnerabilities targeting Microsoft Exchange servers, now referred t
-
Sep 20th, 2022
Threat Graph – Seeing is Believing
We all know the saying that, “a picture is worth a thousand words.” It is a fact that people derive meaning faster from imagery and graphics. At our core, humans are visual. Imagery can convey tho
-
Aug 5th, 2022
Community Powered Insight Gives Defenders the Advantage
Leveraging Automation and the Cloud to Improve Cyber Response Threats are moving faster than ever in today’s cyber threat environment. A timely and impactful response to an ongoing cyberattack is cr