Read insights, thought leadership, and platform updates.
No Blogs Match Your Results
Please try again or contact marketing@threatconnect.com for more information on our blogs.
RQ Enables the Cyber Risk Conversations You’ve Been Waiting For
Modern businesses undergo changes every day that introduce cyber risk and obfuscate residual risks. This is especially true as companies digitize their operations and continue to have a healthy appetite for merger and acquisitions (M&A) activity. You might have a good idea of what risks your current applications present, but can you pinpoint the residual […]
ThreatConnect and OPSWAT MetaDefender Cloud: Malware Protection Meets Playbook Power
ThreatConnect and OPSWAT have delivered a new Playbook for joint customers. This Playbook App will allow you to submit Files for sandbox analysis and retrieve analysis results. In addition to sandboxing, the app lets users retrieve enrichment information for Address, Host, URL, and File IOCs. The following capabilities are available: Automated Malware Sandboxing As part […]
ThreatConnect Research Roundup: Threat Intel Update 3/25/21
Below is this week’s edition of ThreatConnect’s Research Roundup: Threat Intel Update, a collection of recent noteworthy findings from the ThreatConnect Research Team. The items below were created or updated March 11-23, 2021. This week’s findings include intelligence related to the following threats and/or topics: FIN7 UNC1878 / Wizard Spider 20210324A: Possible FIN7 Domain eyebrowaholic[.]com […]
The Cyber Risk Quantification Journey: It’s Not As Hard As Some Think
A survey of 300 cybersecurity professionals who attended a live webinar on cyber risk quantification (CRQ) sponsored by Spire Solutions and ThreatConnect shows that there is truth behind the anecdotal evidence that for too many organizations the early approach to CRQ has been too manual of a process, takes too long, produces questionable results, and […]
ThreatConnect Research Roundup: Threat Intelligence Update 3/15/21
Below is this week’s edition of ThreatConnect’s Research Roundup: Threat Intelligence Update, a collection of recent noteworthy findings from the ThreatConnect Research Team. The items below were created or updated in the last week (March 3 – March 10). This week’s findings include intelligence related to the following threats and/or topics: Information Operations UNC1878 / […]
ThreatConnect and APIVoid: Fuel Orchestrations with Instant Indicator Analysis
ThreatConnect has developed a new Playbook app for ThreatConnect and APIVoid customers. This app allows Threat Intel Analysts a powerful way to get the reputation information on Hosts, URLs, and Address IOCs. Additionally, you can retrieve a screenshot of the webpage served for a given Host or URL for use in reports, amongst other things. […]
Get the Right Data at the Right Time with the Polarity-Cortex XSOAR Integration
Today’s post continues an ongoing series on Polarity Integrations. Data tells a story, Polarity helps you see it with Augmented Reality overlaying contextual information from the applications you use every day. With over 100 powerful integrations the Polarity open-source Integrations Library arms you with the right data at the right time to make informed decisions […]
ThreatConnect and Digital Shadows: Give Your Playbooks a SearchLight
ThreatConnect has improved our existing integration with Digital Shadows SearchLight. With these updates, multiple types of data like social media posts, pastes, dark web pages, technical information like DNS, and more can be found via Shadow Search and brought into ThreatConnect for further analysis. These new capabilities allow you to increase accuracy and efficiency by […]
ThreatConnect and Sumo Logic: Empower Orchestration with Cloud-SIEM
ThreatConnect and Sumo Logic have partnered to deliver a new Playbook app. With this app, SOC analysts can automate searches for events in Sumo Logic and use these searches to do things like retroactive threat hunting or enriching an investigation with important Sumo Logic data. By automating these processes, you allow your team to work […]
Introducing ThreatConnect 6.1: The Tao of Intel-Driven Operations
This was one of the first graphics we created for the ThreatConnect Platform, but it’s one that’s still very meaningful to our latest release. It may seem quaint, and the graphics have certainly improved over the years, but the vision remains the same: threat intelligence can guide security operations towards better decisions, and security operations […]
Harness the Power of Your Digital Shadows Data without Breaking Your Workflow
Today’s post continues an ongoing series on Polarity Integrations. Data tells a story, Polarity helps you see it with Augmented Reality overlaying contextual information from the applications you use every day, no glasses or goggles required. With over 100 powerful integrations, Polarity’s open-source Integrations Library arms you with the right data at the right time […]
ThreatConnect and Malwarebytes Nebula: Make Your Cloud-Based EDR SOAR
ThreatConnect is pleased to deliver a Playbook app for joint customers to leverage Malwarebytes Nebula. Malwarebytes Nebula is a cloud-hosted security operations platform that allows you to manage control of any malware or ransomware incident. With this Playbook App, you can take immediate action to investigate, stop, and remediate potential threats at the endpoint based […]