Read insights, thought leadership, and platform updates.
No Blogs Match Your Results
Please try again or contact marketing@threatconnect.com for more information on our blogs.
Are Critical Infrastructures Ready For The New Federal Cybersecurity Standards Initiative?
President Joe Biden signed a National Security Memorandum last week that establishes a new Industrial Control Systems Cybersecurity Initiative to develop a voluntary set of standards for the nation’s critical infrastructure owners and operators. “The primary objective of this Initiative is to defend the United States’ critical infrastructure by encouraging and facilitating deployment of technologies […]
Q&A: Joe Weiss of Applied Control Solutions on Control Systems and Cybersecurity
During a recent ThreatConnect Podcast, Joe Weiss, Managing Partner at Applied Control Solutions gave his insights and thoughts on Control Systems and Cybersecurity issues facing our nation’s critical infrastructures. Joe is an international authority on control system cybersecurity and is currently a member of the International Society of Automation Standards Committee ISA99, Industrial Automation and […]
Q&A: Bob Kolasky of the Department of Homeland Security on Systemic Cyber Risk and Critical Infrastructure
ThreatConnect Podcast host Dan Verton recently had the pleasure of speaking with Bob Kolasky, Director of the National Risk Management Center at the Cybersecurity and Infrastructure Security Agency (CISA) during a recent ThreatConnect Podcast, where he gave his insights on systemic cyber risk and critical infrastructure. There have been nearly a thousand documented and reported […]
ThreatConnect Supports MITRE ATT&CK Groups and Software
ThreatConnect now supports MITRE ATT&CK Groups and Software within our Platform! Before we dive too deep, let’s define Groups and Software in MITRE ATT&CK. What are Groups? Groups are sets of related intrusion activities tracked by a common name in the security community. Analysts follow clusters of activities using various analytic methodologies and terms such […]
Q&A: AVEVA’s Tim Grieveson on Cyber Risk Management and Critical Infrastructure
During a recent ThreatConnect Podcast, Tim Grieveson, Chief Information Security Officer (CISO) at AVEVA, gave his insights and thoughts on cyber risk management issues facing our nation’s critical infrastructures. The recent surge in cyberattacks targeting critical infrastructure companies demonstrates the urgent need for critical infrastructure owners and operators to adopt a risk-led cybersecurity program. It […]
Q&A: Felicia Thorpe of AHT Insurance on Cyber Insurance and Cyber Risk Quantification
During a recent ThreatConnect webinar, Felicia Thorpe, Managing Advisor at AHT Insurance, offered her insights on the latest trends in the cyber insurance market and changes that need to be considered to battle the surge in ransomware attacks. The increasing sophistication and cost of cyberattacks, particularly ransomware, have led to a massive jump in demand […]
Risk-Threat-Response: The Rosetta Stone for Communicating Cyber Risk
Many security leaders struggle with communicating cyber risk in business and operational terms that matter to C-suite executives and boards of directors. This miscommunication is one of the biggest hurdles faced by many security leaders. Security leaders need a way to translate cyber risk into terms that business executives can understand. When both security and […]
Introducing Playbooks 2.0 and Intelligence Anywhere: Creating a Foundation of Collaboration with ThreatConnect 6.2
ThreatConnect 6.2 introduces Intelligence Anywhere and Playbooks 2.0 for improved ease of use and collaboration. When we think of “collaboration” we usually think about groups of people working together, maybe from different teams, to achieve a common goal. In cybersecurity, that may mean the threat intelligence team provides much-needed context to the SOC, or the […]
Introducing Playbooks 2.0 and Browser Extension: Creating a Foundation of Collaboration with ThreatConnect 6.2
ThreatConnect 6.2 introduces a new Browser Extension and Playbooks 2.0 for improved ease of use and collaboration. When we think of “collaboration” we usually think about groups of people working together, maybe from different teams, to achieve a common goal. In cybersecurity, that may mean the threat intelligence team provides much-needed context to the SOC, […]
GreyNoise and ThreatConnect: Protect against Noisy IPs
ThreatConnect has released a new GreyNoise Playbook App. GreyNoise helps analysts quickly understand which alerts don’t matter by providing context on noisy IP addresses across the internet. With this playbook app, you can look up IP addresses to validate if they are involved in any mass scanning or exploit activity, to more effectively triage alerts. […]
Detect and Contain Cyberattacks Faster With Intelligence-Driven SOAR
When it comes to containing cyberattacks and limiting their ability to cause harm within your environment, time is money. On average, a company able to detect and contain a breach in less than 200 days will spend $1.1 million less than one that needs more time. Yet organizations still struggle to respond to security events […]
Risk Calculations Require Cyber Threat Intelligence
Businesses seeking to understand their risk exposure need to realize that they can’t adequately quantify risk without cyber threat intelligence on the capabilities, intentions, and most frequently employed techniques and tactics of present-day adversaries. In order for quantitative risk calculations to be both accurate and actionable, they must incorporate contextual knowledge into their determinations of […]