Skip to main content
ThreatConnect blog

Read insights, thought leadership, and platform updates.

Showing 626 posts
Sort

No Blogs Match Your Results

Please try again or contact marketing@threatconnect.com for more information on our blogs.

How To Select The Best SOAR Platform For Your Organization
Orchestration and Automation

How To Select The Best SOAR Platform For Your Organization

Information overload is a common challenge facing Security Operations Centers (SOCs). Security analysts are bombarded with hundreds of alerts of potential security events. Sifting through and prioritizing the most important events can take weeks, months, or even longer.  Without the insight of threat intelligence and orchestrated processes to make sense of all the data coming […]

3 Strategies for Dealing With the Widening Cybersecurity Skills Gap
Orchestration and Automation

3 Strategies for Dealing With the Widening Cybersecurity Skills Gap

Many Security Operations Center (SOC) teams are under immense pressure! They’re facing many different challenges and while cybersecurity spending is increasing, investment isn’t always placed where it is needed most (and this is a contributing factor). Creating and maintaining a top-performing SOC team takes time and money. The average cost for employing and maintaining an […]

The Power of Combining Outside-In and Inside-Out Cyber Risk Quantification
Cyber Risk Quantification

The Power of Combining Outside-In and Inside-Out Cyber Risk Quantification

ThreatConnect is excited about the partnership with SecurityScorecard for their Cyber Risk Quantification (CRQ) solution powered by ThreatConnect Risk Quantifier (RQ). Applying ThreatConnect’s statistical and machine learning algorithms to the Security Scorecard data enables customers to easily understand their risk, both external and internal, and more importantly prioritize which factors should be improved based on […]

Why Build A Threat Library?
Threat Intelligence Operations

Why Build A Threat Library?

Cyber threat actors are using more sophisticated tools, techniques, and procedures that are outpacing traditional security solutions. As a result, things such as intrusion detection systems, anti-virus programs, and conventional incident response methodologies by themselves are no longer sufficient to close the widening gap between security and the current threat landscape.  Analysts are over-worked and […]

4 Actions To Help Protect Your Organization From Malicious Russian Cyber Activity
Threat Intelligence Operations

4 Actions To Help Protect Your Organization From Malicious Russian Cyber Activity

The Russian invasion of Ukraine has escalated past traditional warfare. The impact and implications of the attack will be felt far past the region’s borders. The U.S. Government has recently issued statements warning of potential cyberattacks by Russia against the United States. Organizations need to re-evaluate their security measures and should be on the defense […]

The Importance of Assessing & Communicating the Financial Impact of Cyber Risks
Cyber Risk Quantification

The Importance of Assessing & Communicating the Financial Impact of Cyber Risks

  Just as a captain would navigate their ship across vast oceans, it’s the responsibility of business leaders to determine the direction of the overall corporate strategy. To do this effectively, they need to understand their environment and the conditions that may hinder them along the way. Unfortunately, things aren’t always smooth sailing in real […]

Supercharge Your Security Operations With ThreatConnect 6.5
ThreatConnect Platform

Supercharge Your Security Operations With ThreatConnect 6.5

Security operations teams are super busy and it’s not getting any easier. Analysts need to be able to get more done in their day by working smarter, faster, and better. We get it and we hear you! In this release of ThreatConnect 6.5, we have supercharged the ThreatConnect Platform with some exciting updates:   Threat Intel, […]

ThreatConnect Platform

A Long Way in 11 Years: I’m Passing the Torch at ThreatConnect

After 11 years the time has come for me to pass the torch as ThreatConnect’s CEO.  This decision, although hard, is one that I make with great pride for how far the company has come from founding through startup, to what it is today.   I’m so proud of the advancements we’ve driven in cybersecurity, proud […]

How To: Russian Threat Actor Dashboards
ThreatConnect Platform

How To: Russian Threat Actor Dashboards

Since our previous threat intelligence dashboards blog on how to get more visibility over the threat landscape associated with the Russian-Ukraine war, the situation unfortunately hasn’t been resolved, and the U.S. Government has recently issued statements warning of potential cyberattacks by Russia against the United States ThreatConnect has continued to look at how we can […]

Every Type of SOC Needs a SOAR
Orchestration and Automation

Every Type of SOC Needs a SOAR

  Many organizations have a Security Operations Center (SOC). It may not be one that has a large room full of analysts, engineers, threat hunters, and incident responders, with a wall of monitors providing a heads-up display for the staff. It may be a couple of staff working remotely augmented by a SOC as a […]

To Code Or Not To Code
ThreatConnect Platform

To Code Or Not To Code

To code or not to code? That is the question that many security teams grapple with when attempting to solve a specific problem or introduce a new capability.  While TIP and SOAR platforms like ThreatConnect offer many out of the box applications and integrations to support threat intelligence and security operations teams, there may come […]

How to: Dashboards for Ukraine Conflict Threat Intelligence
ThreatConnect Platform

How to: Dashboards for Ukraine Conflict Threat Intelligence

The ThreatConnect Platform is optimized for providing organizations the ability to create a custom dashboard for pulling together real-time, topical threat intelligence into a single view.  The current situation in Ukraine has led organizations to ask – “how should I operationalize our intelligence related to this situation so we can have a better perspective on […]

Browse More Resources