Skip to main content
ThreatConnect blog

Read insights, thought leadership, and platform updates.

Showing 617 posts
Sort

No Blogs Match Your Results

Please try again or contact marketing@threatconnect.com for more information on our blogs.

Preparing for Black Hat 2023: How To Stay Safe at One Of The Largest Cybersecurity Conferences
Cyber Risk Quantification

Preparing for Black Hat 2023: How To Stay Safe at One Of The Largest Cybersecurity Conferences

BlackHat 2023 is just around the corner, and before you head out to Vegas, it’s important to ensure your devices are secure and know what to look out for. To help attendees prepare for their security during the conference, here are some best practices to follow: Avoid public Wi-Fi networks, including hotel networks. Wi-Fi compromise […]

Securonix Launches ChatGPT Integration Harnessing the Power of Gen AI to Reduce Incident Response Time
Polarity

Securonix Launches ChatGPT Integration Harnessing the Power of Gen AI to Reduce Incident Response Time

We at Polarity and our technology partner, Securonix, are thrilled to announce the capabilities of the Polarity-ChatGPT Integration available within the Securonix Investigate environment, creating a seamless experience for integrating generative AI into security practitioners’ workflows. Integration of generative AI in investigation workflow greatly improves analyst efficiency and reduces mean time to resolution (MTTR) to cyberthreats **ADDISON, […]

The Tenets of Threat Intel Operations – Tenet #3
Threat Intelligence Operations ThreatConnect Platform

The Tenets of Threat Intel Operations – Tenet #3

In the first blog of this series, I took a 30,000-foot view of the seven tenets of TI Ops defined in the Dawn of Threat Intelligence Operations paper. In this blog, I’m diving deeper into Tenet #3 – Threat intel is aligned and focused on the most critical risks to the business through a living […]

Transforming Cyber Risk Quantification and Analysis: A Customer Case Study with ThreatConnect Risk Quantifier
Cyber Risk Quantification ThreatConnect Platform

Transforming Cyber Risk Quantification and Analysis: A Customer Case Study with ThreatConnect Risk Quantifier

In today’s rapidly evolving cybersecurity landscape, organizations realize the significance of quantifying cyber risk to make informed decisions. This blog highlights our recent case study that explores the challenges a leading pharmaceutical company faces in its risk quantification and analysis processes. We will look at how the implementation of ThreatConnect Risk Quantifier (RQ) revolutionized their […]

Forrester Wave™ for Cyber Risk Quantification and Our Threat Centric Approach to CRQ
Cyber Risk Quantification ThreatConnect Platform

Forrester Wave™ for Cyber Risk Quantification and Our Threat Centric Approach to CRQ

ThreatConnect Risk Quantifier was recently named a leader in The Forrester Wave™ for Cyber Risk Quantification (CRQ), Q3 2023 and we couldn’t be more excited for the recognition. We’ve grown over the years from a small team trying to solve a hard problem to one leveraging the best of AI and ML as a leader […]

ThreatConnect 7.2: Harnessing ATT&CK Visualizer for Evolved Threat Intel
Threat Intelligence Operations ThreatConnect Platform

ThreatConnect 7.2: Harnessing ATT&CK Visualizer for Evolved Threat Intel

Today, we’re launching version 7.2 of the ThreatConnect TI Ops Platform. It’s an exciting day because, with this release, we’re giving a massive upgrade to our customers with some fantastic new features and capabilities. Our latest features now include ATT&CK Visualizer, ThreatConnect’s native ATT&CK navigator, and Tag Normalization and Management.  ATT&CK Visualizer will enable Threat […]

ThreatConnect Named a Leader in The Forrester Wave™: Cyber Risk Quantification, Q3 2023 Report
Cyber Risk Quantification

ThreatConnect Named a Leader in The Forrester Wave™: Cyber Risk Quantification, Q3 2023 Report

Forrester has named ThreatConnect a Leader in The Forrester Wave™: Cyber Risk Quantification, Q3 2023 report. According to the report, “ThreatConnect sets the standard for a threat-driven approach to CRQ.” ThreatConnect RQ was ranked highest in the Current Offering category. ThreatConnect RQ: Redefining Cyber Risk Quantification In our opinion, ThreatConnect RQ stands out in the rapidly […]

The Power of CRQ in Managing Software Supply Chain Risks
Cyber Risk Quantification

The Power of CRQ in Managing Software Supply Chain Risks

In today’s interconnected world, software supply chains play a crucial role in the functioning of businesses and organizations across various sectors. However, they also present a significant risk to cybersecurity. The increasing complexity and interdependencies within software supply chains have made them vulnerable to various threats, such as malware, data breaches, and unauthorized access. To […]

The 7 Critical Elements of a Robust PIR
Threat Intelligence Operations ThreatConnect Platform

The 7 Critical Elements of a Robust PIR

Threat intelligence is crucial in understanding the threat landscape and making informed decisions. Priority Intelligence Requirements (PIRs) are central to effective threat intelligence planning and operations. PIRs enable organizations to prioritize and act upon the most relevant threats, giving focus to the management of threat intelligence. In this blog, we explore the concept of PIRs […]

The Future of Threat Intelligence for Large Enterprises
Threat Intelligence Operations ThreatConnect Platform

The Future of Threat Intelligence for Large Enterprises

The evolving cyber threat landscape demands an innovative approach to cybersecurity, especially for large enterprises. Retail organizations and banks, in particular, face complex challenges in managing and mitigating cyber threats. The amount of data involved, coupled with the need to access multiple sources of intelligence, can be overwhelming. Our goal is to explore the changing […]

5 Powerful Splunk Queries to Enhance Your Team
Polarity

5 Powerful Splunk Queries to Enhance Your Team

Maximizing your Splunk Investment with Polarity In the ever-evolving landscape of cybersecurity threats, organizations need to be prepared to investigate and respond to incidents immediately, and with confidence. Splunk plays a crucial role in this process for many organizations. Many teams need to respond to more attacks than ever before, often with less time and […]

Why Threat Intel is Critical for Supply Chain Security
Threat Intelligence Operations ThreatConnect Platform

Why Threat Intel is Critical for Supply Chain Security

In today’s interconnected world, organizations rely heavily on a complex network of suppliers and vendors critical to their operations. They supply software used across an enterprise and provide services that may be part of essential business processes. While these partnerships offer numerous benefits, they can also introduce significant cyber risks that can impact the security […]

Browse More Resources