Maturing Your Cybersecurity Program

Mature Your Cybersecurity Program

Create Your Own Threat Intelligence

One of the most important actions one can take in ThreatConnect is actually getting data into the Platform. Although we have robust tools for importing structured and unstructured data, many of our users are actually looking to create new intelligence and adapt it to suit their workflow.

Creating threat intelligence indicates a new level of maturity for many organizations – they have moved beyond simply ingested threat indicators and checking for matches in their environment, to proactively searching for information about threats. Understandably, this process can be very time consuming.

We’ve made threat intelligence creation easy. ThreatConnect’s Create feature allows you to build and store your own indicators and groups in ThreatConnect. Simply click on CREATE in the top navigation to get to the Create feature. Here, you can quickly and easily add descriptions, tags, and associations.

 

 

 

 

Dan Verton
About the Author
Dan Verton

Dan Verton is ThreatConnect's Director of Content Marketing. Dan is an award-winning journalist and a former intelligence officer in the U.S. Marine Corps. He has authored several books on cybersecurity, including the 2003 groundbreaking work, Black Ice: The Invisible Threat of Cyber-Terrorism (McGraw-Hill) and The Hacker Diaries: Confessions of Teenage Hackers (McGraw-Hill). He has a Master of Arts in Journalism from American University in Washington, D.C.

Share

Subscribe