Skip to main content
ThreatConnect blog

Read insights, thought leadership, and platform updates.

Showing 626 posts
Sort

No Blogs Match Your Results

Please try again or contact marketing@threatconnect.com for more information on our blogs.

Introducing the ThreatConnect Threat Intelligence Operations Buyers Guide
Threat Intelligence Operations Threat Intelligence Platform

Introducing the ThreatConnect Threat Intelligence Operations Buyers Guide

I’m excited to announce the release of ThreatConnect’s Threat Intelligence Operations Buyers Guide. The need for this type of guide is critical as the adoption of cyber threat intel (CTI) grows, and cybersecurity teams starting this journey need an understanding of what is required to implement and grow a TI Ops function. I continue to […]

Top 3 User Group Takeaways from ThreatConnect Customers
Threat Intelligence Operations Threat Intelligence Platform

Top 3 User Group Takeaways from ThreatConnect Customers

ThreatConnect hosted four customer user groups in 2023, and we are grateful to our customers for providing invaluable insights. These insights will inform our product roadmap and our users’ shared strategies on how to get the most out of ThreatConnect. These events have served as a platform for sharing knowledge, exchanging ideas, and fostering collaborative […]

Intelligence-Powered Cybersecurity for State, Local, and Territorial Governments
Threat Intelligence Operations

Intelligence-Powered Cybersecurity for State, Local, and Territorial Governments

State, local, and tribal (SLT) governments are responsible for numerous critical services like educating children, providing safe drinking water, delivering safety and emergency services, managing airports, and administering elections. Yet, the threat landscape for SLT governments is getting even more hostile. Ransomware gangs are increasingly indiscriminate regarding who they target and impact. Sophos’ “The State […]

The 7 Tenets of Threat Intelligence Operations – Tenet #5: Automate TI Ops Work
Threat Intelligence Operations Threat Intelligence Platform

The 7 Tenets of Threat Intelligence Operations – Tenet #5: Automate TI Ops Work

In the first blog of this series, I took a 30,000 foot view of the seven tenets of TI Ops defined in the Dawn of Threat Intelligence Operations paper. In this blog, I’m diving deeper into Tenet 5 – Automate TI Ops Work Automate the work of the TI Ops team Automation has permeated our […]

Create Intelligence Requirements in 5 Easy Steps
Threat Intelligence Operations ThreatConnect Platform

Create Intelligence Requirements in 5 Easy Steps

How to Understand Intelligence Requirements As threat landscapes morph, intelligence requirements have emerged as a vital tool for cyber threat research and analysis. These are topics or research questions centered on an organization’s cyber threat priorities. They guide the Security or Threat Intelligence Team’s research and analysis efforts, providing valuable insights into threats, vulnerabilities, and […]

Top 5 Use Cases for ATT&CK Visualizer
Threat Intelligence Operations ThreatConnect Platform

Top 5 Use Cases for ATT&CK Visualizer

The cybersecurity landscape is complex and fraught with many threats and vulnerabilities. Understanding and navigating this space requires access to up-to-date information on the activities of threat actors, which you can get through ThreatConnect ATT&CK Visualizer.  What is ATT&CK Visualizer? ThreatConnect ATT&CK Visualizer is our new interactive platform capability that visualizes the MITRE ATT&CK matrix […]

The 7 Tenets of Threat Intelligence Operations – Tenet #4 – Go Beyond IoCs
Threat Intelligence Operations ThreatConnect Platform

The 7 Tenets of Threat Intelligence Operations – Tenet #4 – Go Beyond IoCs

In the first blog of this series, I took a 30,000 foot view of the seven tenets of TI Ops defined in the Dawn of Threat Intelligence Operations paper. In this blog, I’m diving deeper into Tenet #4 – Focus is not solely on indicators of compromise, but expands to cover the motivations, tactics, techniques, […]

That’s A Wrap From Black Hat USA 2023
Thought Leadership Threat Intelligence Operations

That’s A Wrap From Black Hat USA 2023

Another Black Hat USA is in the books, and we’re already looking forward to 2024. The energy across the event was great, and as always, it was fun to catch up with colleagues, customers, and friends in person. I polled my colleagues on their takeaways from this year and what changed from BHUSA 2022.  Quality […]

ThreatConnect and Intel 471: Comprehensive Intelligence to Protect Your Mission
Product Blog ThreatConnect Platform

ThreatConnect and Intel 471: Comprehensive Intelligence to Protect Your Mission

We’re improving our integration with Intel 471 by releasing more apps and functionality between the platforms. We now have multiple Runtime Playbook Apps, a Job App, and a Service App for joint customers to leverage. The following use cases are enabled through this integration: Utilize Intel 471 intelligence in an enrichment fashion to correlate and […]

Preparing for Black Hat 2023: How To Stay Safe at One Of The Largest Cybersecurity Conferences
Cyber Risk Quantification

Preparing for Black Hat 2023: How To Stay Safe at One Of The Largest Cybersecurity Conferences

BlackHat 2023 is just around the corner, and before you head out to Vegas, it’s important to ensure your devices are secure and know what to look out for. To help attendees prepare for their security during the conference, here are some best practices to follow: Avoid public Wi-Fi networks, including hotel networks. Wi-Fi compromise […]

Securonix Launches ChatGPT Integration Harnessing the Power of Gen AI to Reduce Incident Response Time
Polarity

Securonix Launches ChatGPT Integration Harnessing the Power of Gen AI to Reduce Incident Response Time

We at Polarity and our technology partner, Securonix, are thrilled to announce the capabilities of the Polarity-ChatGPT Integration available within the Securonix Investigate environment, creating a seamless experience for integrating generative AI into security practitioners’ workflows. Integration of generative AI in investigation workflow greatly improves analyst efficiency and reduces mean time to resolution (MTTR) to cyberthreats **ADDISON, […]

The Tenets of Threat Intel Operations – Tenet #3
Threat Intelligence Operations ThreatConnect Platform

The Tenets of Threat Intel Operations – Tenet #3

In the first blog of this series, I took a 30,000-foot view of the seven tenets of TI Ops defined in the Dawn of Threat Intelligence Operations paper. In this blog, I’m diving deeper into Tenet #3 – Threat intel is aligned and focused on the most critical risks to the business through a living […]

Browse More Resources