Skip to main content
Dataminr Redefines Cyber Defense with AI-Powered Client-Tailored Intelligence and Autonomous Threat and Exposure Management
Learn More
Request a Demo
ThreatConnect blog

Read insights, thought leadership, and platform updates.

Showing 510 posts
Sort

No Blogs Match Your Results

Please try again or contact marketing@threatconnect.com for more information on our blogs.

Maturing Cyber Processes: Enhancing SOP Reliability
Polarity

Maturing Cyber Processes: Enhancing SOP Reliability

Current State of SOPs: Do as we say, not as we do If we look around our corporate environment, many employees within the enterprise can be classified as “knowledge workers.” Those employees are trusted to think, analyze, and apply scrutiny to information such that the best decions can be made, increasing the probability of a […]

Introducing Polarity’s Chrome Extension
Polarity

Introducing Polarity’s Chrome Extension

We’re thrilled to announce our new Polarity Chrome Extension, available for anyone with access to Polarity using a Chrome based browser. Now, get the power of searching in Polarity as you work in Chrome. To get started: 1. Search for “Polarity” in the Chrome Extension Store, or visit the direct link here. 2. Click “Add […]

Zero Trust Steps Up To Shut Down Threat Actors
Security Operations Threat Intelligence Operations

Zero Trust Steps Up To Shut Down Threat Actors

Over a decade ago, Forrester Research introduced the concept of zero trust. Today, zero trust is considered one of the leading frameworks to guide information and security architects in the design of robust and resilient information security architectures. This is a very important aspect of zero trust – it’s a framework that influences security architectures […]

Announcing the Polarity Community Contributor of the Quarter, April 2023
Polarity

Announcing the Polarity Community Contributor of the Quarter, April 2023

We here at Polarity are excited to bring back our Contributor of the Quarter award for 2023 by announcing this quarter’s contributor, John Winchester of Secrutiny! John and team over at Secrutiny have been doing some fantastic things, and not just with Polarity. If you aren’t familiar with Secrutiny, they are an MSSP that believes cybersecurity doesn’t have […]

Delivering Polarity via iFrame in your Favorite Workflow Tools
Polarity

Delivering Polarity via iFrame in your Favorite Workflow Tools

In March of 2023 Polarity officially released one of our new features – Polarity Web Search. While we are still pushing the boundaries of human driven analysis – and consolidating enterprise knowledge (stuff you know) and data (stuff you have) into one unified view by way of our Polarity Desktop Client – we sought to deliver […]

ThreatConnect 7.1: An Even Better User Experience
Threat Intelligence Operations ThreatConnect Platform

ThreatConnect 7.1: An Even Better User Experience

ThreatConnect’s 7.1 release delivers an even better ThreatConnect user experience. ThreatConnect 7.1 strengthens capabilities introduced in 7.0, including Enrichment and Reporting, providing more flexibility and customization while also refining the Platform for a more streamlined user experience so security teams can be more efficient and effective.   Built-in Enrichment v2 When investigating an indicator, knowledge is […]

ThreatConnect, Inc Achieves SOC 2 Type 2 Compliance
ThreatConnect Platform

ThreatConnect, Inc Achieves SOC 2 Type 2 Compliance

In partnership with one of the most well-respected independent auditors, Schellman & Company, ThreatConnect has achieved SOC 2 Type 2 compliance with our Dedicated Cloud and Risk Quantifier products for the second year in a row. Over the last few years, ThreatConnect has demonstrated our commitment to protecting our customer’s data by aligning our security […]

The 7 Tenets of Threat Intel Operations – Tenet #1: Elevating Threat Intelligence
Intelligence-Powered Security Operations Threat Intelligence Operations

The 7 Tenets of Threat Intel Operations – Tenet #1: Elevating Threat Intelligence

In the first blog of this series, I took a 30,000-foot view of the 7 Tenets of TI Ops defined in the Dawn of Threat Intelligence Operations paper. In this edition, I’m going to dig into Tenet #1 – Elevates threat intelligence to a mandatory, critical security operations role – in more detail. In the […]

Why Every Team Needs Federated Search
Polarity

Why Every Team Needs Federated Search

Data, information, and knowledge exists in too many different places to ask employees to search them all manually. New employees don’t know where data is and senior employees waste time searching systems that may not even contain the information they are looking for. Searching through all of this siloed information is not only inefficient, but […]

The Tenets of Threat Intel Operations
Threat Intelligence Operations ThreatConnect Platform

The Tenets of Threat Intel Operations

Many organizations struggle to demonstrate value for threat intel and their threat intelligence teams. The intel team is trying to do the right thing though. They are collecting threat intelligence, managing it into usable shape, making it available for use, and then struggling to find consumers who need, or want, to use it.  Security operations […]

Uniting the Threat and Risk Intelligence Across ALL Domains
Threat Intelligence Operations Threat Intelligence Platform

Uniting the Threat and Risk Intelligence Across ALL Domains

Blog authored by Dave DeWalt, Founder and Managing Director, NightDragon. Read it on the Night Dragon’s website here We live in a true golden age of data and information. Organizations have more threat intelligence, whether it be cyber, physical, etc, at their fingertips than ever before, from vulnerabilities to adversary profiles and more.  Inside these […]

The Need for an Evolved Threat Intel Lifecycle
Intelligence-Powered Security Operations Threat Intelligence Operations

The Need for an Evolved Threat Intel Lifecycle

If you’ve seen our blog, “Luke in the Sky with Diamonds,” or have read Adam Shostack’s excellent book: “Threats: What Every Engineer Should Learn From Star Wars,” you know that Star Wars is really just a series of cybersecurity parables. In this blog, we’re going to examine how the lead-up to the Battle of Hoth […]

Browse More Resources