Read insights, thought leadership, and platform updates.
No Blogs Match Your Results
Please try again or contact marketing@threatconnect.com for more information on our blogs.
Transforming Cyber Risk Quantification and Analysis: A Customer Case Study with ThreatConnect Risk Quantifier
In today’s rapidly evolving cybersecurity landscape, organizations realize the significance of quantifying cyber risk to make informed decisions. This blog highlights our recent case study that explores the challenges a leading pharmaceutical company faces in its risk quantification and analysis processes. We will look at how the implementation of ThreatConnect Risk Quantifier (RQ) revolutionized their […]
Forrester Wave™ for Cyber Risk Quantification and Our Threat Centric Approach to CRQ
ThreatConnect Risk Quantifier was recently named a leader in The Forrester Wave™ for Cyber Risk Quantification (CRQ), Q3 2023 and we couldn’t be more excited for the recognition. We’ve grown over the years from a small team trying to solve a hard problem to one leveraging the best of AI and ML as a leader […]
ThreatConnect 7.2: Harnessing ATT&CK Visualizer for Evolved Threat Intel
Today, we’re launching version 7.2 of the ThreatConnect TI Ops Platform. It’s an exciting day because, with this release, we’re giving a massive upgrade to our customers with some fantastic new features and capabilities. Our latest features now include ATT&CK Visualizer, ThreatConnect’s native ATT&CK navigator, and Tag Normalization and Management. ATT&CK Visualizer will enable Threat […]
ThreatConnect Named a Leader in The Forrester Wave™: Cyber Risk Quantification, Q3 2023 Report
Forrester has named ThreatConnect a Leader in The Forrester Wave™: Cyber Risk Quantification, Q3 2023 report. According to the report, “ThreatConnect sets the standard for a threat-driven approach to CRQ.” ThreatConnect RQ was ranked highest in the Current Offering category. ThreatConnect RQ: Redefining Cyber Risk Quantification In our opinion, ThreatConnect RQ stands out in the rapidly […]
The Power of CRQ in Managing Software Supply Chain Risks
In today’s interconnected world, software supply chains play a crucial role in the functioning of businesses and organizations across various sectors. However, they also present a significant risk to cybersecurity. The increasing complexity and interdependencies within software supply chains have made them vulnerable to various threats, such as malware, data breaches, and unauthorized access. To […]
The 7 Critical Elements of a Robust PIR
Threat intelligence is crucial in understanding the threat landscape and making informed decisions. Priority Intelligence Requirements (PIRs) are central to effective threat intelligence planning and operations. PIRs enable organizations to prioritize and act upon the most relevant threats, giving focus to the management of threat intelligence. In this blog, we explore the concept of PIRs […]
The Future of Threat Intelligence for Large Enterprises
The evolving cyber threat landscape demands an innovative approach to cybersecurity, especially for large enterprises. Retail organizations and banks, in particular, face complex challenges in managing and mitigating cyber threats. The amount of data involved, coupled with the need to access multiple sources of intelligence, can be overwhelming. Our goal is to explore the changing […]
5 Powerful Splunk Queries to Enhance Your Team
Maximizing your Splunk Investment with Polarity In the ever-evolving landscape of cybersecurity threats, organizations need to be prepared to investigate and respond to incidents immediately, and with confidence. Splunk plays a crucial role in this process for many organizations. Many teams need to respond to more attacks than ever before, often with less time and […]
Why Threat Intel is Critical for Supply Chain Security
In today’s interconnected world, organizations rely heavily on a complex network of suppliers and vendors critical to their operations. They supply software used across an enterprise and provide services that may be part of essential business processes. While these partnerships offer numerous benefits, they can also introduce significant cyber risks that can impact the security […]
Applying the Diamond Model for Threat Intelligence to the Star Wars’ Battle of Yavin
Alternate titles: “Diamonds are a Sith’s best friend” “I used to Bullseye Womp Rats in my t-shirt back home.” “That’s no Shamoon…it’s a space station attack! Those of you who know ThreatConnect well are aware that we’re Star Wars fans. A recent example and awesome webinar if you haven’t seen it – The Need for […]
Day in the Life of a TI Analyst Part 2: Dashing Through Dashboards
Welcome back, Class! This is ThreatConnect 101 for CTI analysts featuring me…a former analyst and all-around nerd. If you haven’t seen the first post in this series, I highly recommend checking that out before diving into this one. Check out ThreatConnect Query Language (TQL) for People Who Don’t Code. Part 1 lays the foundation that we’ll […]
The 7 Tenets of Threat Intelligence Operations – Tenet #2: Requires an Evolved Threat Intelligence Lifecycle
In the first blog of this series, I took a 30,000-foot view of the seven tenets of TI Ops defined in the Dawn of Threat Intelligence Operations paper. In this edition we are going to dig into Tenet #2 – Requires an Evolved Threat Intelligence Lifecycle, one that emphasizes the planning and requirements and the […]