Skip to main content
Dataminr Redefines Cyber Defense with AI-Powered Client-Tailored Intelligence and Autonomous Threat and Exposure Management
Learn More
Request a Demo
ThreatConnect blog

Read insights, thought leadership, and platform updates.

Showing 510 posts
Sort

No Blogs Match Your Results

Please try again or contact marketing@threatconnect.com for more information on our blogs.

Cyber Risk Quantification

RQ Enables the Cyber Risk Conversations You’ve Been Waiting For

Modern businesses undergo changes every day that introduce cyber risk and obfuscate residual risks. This is especially true as companies digitize their operations and continue to have a healthy appetite for merger and acquisitions (M&A) activity. You might have a good idea of what risks your current applications present, but can you pinpoint the residual […]

ThreatConnect Platform

ThreatConnect and OPSWAT MetaDefender Cloud: Malware Protection Meets Playbook Power

ThreatConnect and OPSWAT have delivered a new Playbook for joint customers. This Playbook App will allow you to submit Files for sandbox analysis and retrieve analysis results. In addition to sandboxing, the app lets users retrieve enrichment information for Address, Host, URL, and File IOCs. The following capabilities are available: Automated Malware Sandboxing As part […]

ThreatConnect Platform

ThreatConnect Research Roundup: Threat Intel Update 3/25/21

Below is this week’s edition of ThreatConnect’s Research Roundup: Threat Intel Update, a collection of recent noteworthy findings from the ThreatConnect Research Team. The items below were created or updated March 11-23, 2021. This week’s findings include intelligence related to the following threats and/or topics: FIN7 UNC1878 / Wizard Spider 20210324A: Possible FIN7 Domain eyebrowaholic[.]com […]

The Cyber Risk Quantification Journey: It’s Not As Hard As Some Think
Cyber Risk Quantification

The Cyber Risk Quantification Journey: It’s Not As Hard As Some Think

A survey of 300 cybersecurity professionals who attended a live webinar on cyber risk quantification (CRQ) sponsored by Spire Solutions and ThreatConnect shows that there is truth behind the anecdotal evidence that for too many organizations the early approach to CRQ has been too manual of a process, takes too long, produces questionable results, and […]

ThreatConnect Platform

ThreatConnect Research Roundup: Threat Intelligence Update 3/15/21

Below is this week’s edition of ThreatConnect’s Research Roundup: Threat Intelligence Update, a collection of recent noteworthy findings from the ThreatConnect Research Team. The items below were created or updated in the last week (March 3 – March 10). This week’s findings include intelligence related to the following threats and/or topics: Information Operations UNC1878 / […]

ThreatConnect Platform

ThreatConnect and APIVoid: Fuel Orchestrations with Instant Indicator Analysis

ThreatConnect has developed a new Playbook app for ThreatConnect and APIVoid customers. This app allows Threat Intel Analysts a powerful way to get the reputation information on Hosts, URLs, and Address IOCs. Additionally, you can retrieve a screenshot of the webpage served for a given Host or URL for use in reports, amongst other things. […]

Get the Right Data at the Right Time with the Polarity-Cortex XSOAR Integration
Polarity

Get the Right Data at the Right Time with the Polarity-Cortex XSOAR Integration

Today’s post continues an ongoing series on Polarity Integrations. Data tells a story, Polarity helps you see it with Augmented Reality overlaying contextual information from the applications you use every day. With over 100 powerful integrations the Polarity open-source Integrations Library arms you with the right data at the right time to make informed decisions […]

ThreatConnect Platform

ThreatConnect and Digital Shadows: Give Your Playbooks a SearchLight

ThreatConnect has improved our existing integration with Digital Shadows SearchLight. With these updates, multiple types of data like social media posts, pastes, dark web pages, technical information like DNS, and more can be found via Shadow Search and brought into ThreatConnect for further analysis. These new capabilities allow you to increase accuracy and efficiency by […]

ThreatConnect Platform

ThreatConnect and Sumo Logic: Empower Orchestration with Cloud-SIEM

ThreatConnect and Sumo Logic have partnered to deliver a new Playbook app. With this app, SOC analysts can automate searches for events in Sumo Logic and use these searches to do things like retroactive threat hunting or enriching an investigation with important Sumo Logic data.  By automating these processes, you allow your team to work […]

ThreatConnect Platform

Introducing ThreatConnect 6.1: The Tao of Intel-Driven Operations

This was one of the first graphics we created for the ThreatConnect Platform, but it’s one that’s still very meaningful to our latest release. It may seem quaint, and the graphics have certainly improved over the years, but the vision remains the same: threat intelligence can guide security operations towards better decisions, and security operations […]

Harness the Power of Your Digital Shadows Data without Breaking Your Workflow
Polarity

Harness the Power of Your Digital Shadows Data without Breaking Your Workflow

Today’s post continues an ongoing series on Polarity Integrations. Data tells a story, Polarity helps you see it with Augmented Reality overlaying contextual information from the applications you use every day, no glasses or goggles required. With over 100 powerful integrations, Polarity’s open-source Integrations Library arms you with the right data at the right time […]

ThreatConnect Platform

ThreatConnect and Malwarebytes Nebula: Make Your Cloud-Based EDR SOAR

ThreatConnect is pleased to deliver a Playbook app for joint customers to leverage Malwarebytes Nebula. Malwarebytes Nebula is a cloud-hosted security operations platform that allows you to manage control of any malware or ransomware incident. With this Playbook App, you can take immediate action to investigate, stop, and remediate potential threats at the endpoint based […]

Browse More Resources