Skip to main content
Dataminr Redefines Cyber Defense with AI-Powered Client-Tailored Intelligence and Autonomous Threat and Exposure Management
Learn More
Request a Demo
ThreatConnect blog

Read insights, thought leadership, and platform updates.

Showing 510 posts
Sort

No Blogs Match Your Results

Please try again or contact marketing@threatconnect.com for more information on our blogs.

Orchestration and Automation

Importance of Automation in Event Prioritization

Event prioritization means organizing your events and picking the most important items to address first. The reason for this is simple and hopefully obvious: you want to identify which event is more important to you to help you determine which task/event you want to commit to first and where immediate attention is required. How importance […]

3 Reasons The Insurance Industry Desperately Needs Automated Cyber Risk Quantification
Cyber Risk Quantification

3 Reasons The Insurance Industry Desperately Needs Automated Cyber Risk Quantification

The cyber insurance industry is in turmoil as more and more businesses seek insurance protection against the onslaught of advanced threats, particularly ransomware, while both carriers and those seeking insurance lack the ability to automate risk and financial models to calculate security control improvements, improve response times and reduce exposure. The increasing sophistication and cost […]

Inside The Business Benefits of Automated Cyber Risk Quantification
Cyber Risk Quantification

Inside The Business Benefits of Automated Cyber Risk Quantification

Many businesses may have heard of cyber risk quantification (CRQ), but most businesses still don’t know what their exposure is to any given cyber event. And how could they when their security teams are presented with thousands of Common Vulnerabilities and Exposures (CVEs) that all have the highest severity rating? One of our most important […]

ThreatConnect Platform

ThreatConnect and Freshservice: Better Ticket Management

ThreatConnect has released a Playbook App for joint customers to leverage Freshservice. With this new Playbook App, you can easily manage or create tickets in Freshservice from ThreatConnect. Repeatable and mundane tasks like copy and pasting information from ThreatConnect to Freshservice or opening a Freshservice ticket can now be completely automated. Freshservice Playbook App Through […]

ThreatConnect Platform

ThreatConnect and RiskIQ PassiveTotal: Better Enrichment Capabilities with PassiveTotal

ThreatConnect is pleased to deliver a Playbook App for joint customers to leverage RiskIQ PassiveTotal capabilities within the ThreatConnect Platform. With this app, you can query PassiveTotal for enrichment information on various indicators of compromise (IOC) types. By automating this process, you bring relevant, timely, and accurate threat intelligence into ThreatConnect and use it to […]

ThreatConnect Platform

ThreatConnect: Helping to Deliver on the Promise of XDR

Editor’s Note: In this first of two articles, ThreatConnect’s Director of Security Architecture Chris Adams breaks down the primary requirements of an XDR as defined by Gartner, and provides a bit of color as to why those are important and how ThreatConnect meets them, sometimes with integration partners.    On the surface, it’s no surprise […]

Security Operations

ThreatConnect’s New Whitepaper is a Must-Read For CISOs and SOC Directors

Chief Information Security Officers have more data on cyber threats and vulnerabilities than ever before. However, the majority of them still struggle to explain risk to their C-suite and boardroom counterparts in language-centered on business impact and financial risk. One of the most critical challenges facing CISOs today is this inability to understand the core […]

Threat Research

Biden Executive Order on Cybersecurity Aligns With Risk, Threat, Response Approach

Amid the lingering shadow of the Colonial Pipeline ransomware attack, President Biden signed an executive order last week that outlines “bold changes” that overall take a risk-led approach to cybersecurity and attempt to bridge the gap between cyber threat intelligence and operations. “Incremental improvements will not give us the security we need; instead, the Federal […]

ThreatConnect Platform

ThreatConnect and Censys: Enrich Threat Data to Enhance Decision Making

ThreatConnect and Censys (www.censys.io) have partnered to deliver the Censys Playbook App. This App allows you to retrieve multiple types of enrichment information for IOCs. Additionally,  it allows you to craft custom Censys searches to retrieve result sets based on factors such as software versions being run, services running, open ports, and more. You can […]

Cyber Risk Quantification

Cyber Execs Warn CISOs Could Disappear If They Don’t Get Better at Communicating Risk

Three leading global chief information security officers (CISOs) with a wide range of experience across different industries warned that if CISOs do not improve their ability to communicate cyber risk to business executives and boards of directors the position of CISO itself could disappear in the next 10 years. “The successful CISO is the [one] […]

ThreatConnect Platform

ThreatConnect and Palo Alto Wildfire: Enhanced Malware Analysis

ThreatConnect and Palo Alto have delivered a new Playbook App for joint customers. This Playbook App will allow you to submit Files for sandbox analysis and retrieve analysis results. In addition to sandboxing, the app lets users retrieve enrichment information for Address, Host, URL, and File IOCs. The following capabilities are available: Automated Malware Sandboxing […]

ThreatConnect Platform

ThreatConnect and NetWitness: Multiple Apps Allow for Advanced Functionality

ThreatConnect and Netwitness, an RSA business, have strengthened our partnership by releasing multiple Playbook and Service Apps for the NetWitness Platform. With these new apps, you can automate case management, search requests, enrichment, and hunting actions, as well as investigation and response actions. By automating these processes, you ensure that high fidelity intelligence is being […]

Browse More Resources