Skip to main content
ThreatConnect blog

Read insights, thought leadership, and platform updates.

Showing 630 posts
Sort

No Blogs Match Your Results

Please try again or contact marketing@threatconnect.com for more information on our blogs.

It’s Time to Flip the Script on How We Measure and Communicate Cyber Risk
Cyber Risk Quantification

It’s Time to Flip the Script on How We Measure and Communicate Cyber Risk

The U.S. Securities and Exchange Commission (SEC) recently signaled its intent to get much tougher on companies when it comes to their management of cyber risk and inadequate disclosure of cybersecurity vulnerabilities.  This summer, the SEC issued $1.5 million in fines against two companies – one for allegedly misleading investors about the details of a […]

ThreatConnect Platform

ThreatConnect and Cherwell: Better Record Management

ThreatConnect has released a Playbook App for joint customers to leverage Cherwell.  Cherwell is a comprehensive IT service desk solution for enterprise IT services and support. With the new Cherwell Playbook App, you can easily automate more tedious tasks, or create and manage incident records between Cherwell and ThreatConnect. Cherwell Service Management   This integration […]

ThreatConnect and Google Drive: Easily Automate File Storage in the Cloud
ThreatConnect Platform

ThreatConnect and Google Drive: Easily Automate File Storage in the Cloud

  ThreatConnect has released a Playbook App for ThreatConnect and Google Drive customers to automate the creation of files and folders. Google Drive offers easy and secure access to your content in the cloud. You can create, store, and access content from any device with Google Drive, and now you can automate the creation of […]

ThreatConnect Platform

ThreatConnect 6.3 Adds New Group Objects, Workflow Metrics, and Workflow Attributes to Powerful Lineup of TIP and SOAR Capabilities

ThreatConnect 6.3 introduces major core architecture changes to the TIP side of our platform with the introduction of New Group Objects as well as major changes to the SOAR side with the addition of Workflow Attributes and Workflow Metrics. In 6.3, we’re giving you new ways to adapt to the Platform. We’re adding Attribute support […]

Orchestration and Automation

5 Ways An Intelligence-Driven SOAR Platform Can Help Your SecOps Team

An intelligence-driven SOAR Platform empowers SecOps teams to work smarter not harder so that they can make better operational decisions and find the most effective strategies. When resources are scarce, it’s imperative that security teams find and use technologies that will help them streamline processes to reduce the complexity of their jobs. Intelligence on adversarial […]

A Penny For Your Thoughts — What’s New in CAL 2.9
ThreatConnect Platform

A Penny For Your Thoughts — What’s New in CAL 2.9

I’ve always said that IOC’s are like pennies in the currency of intelligence — annoying to deal with, but en masse they can add up to something big.  Sometimes you won’t know what you have until you start flipping over the proverbial couch cushions of your organization’s log files, scan results, and so on. If […]

Inside Today’s SOC: More Spending, Fewer Skilled Staff, Less Capability
Security Operations

Inside Today’s SOC: More Spending, Fewer Skilled Staff, Less Capability

Security Operations Center (SOC) teams are being stretched to the breaking point. Although global cybersecurity spending continues to grow at a record pace, eclipsing investments in many other areas of technology, risk management, and operational infrastructure, few security operations centers are achieving the meaningful and demonstrable results that Chief Information Security Officers (CISOs) are hoping […]

Cybersecurity Workforce Gap Challenges New CISA Director
Orchestration and Automation

Cybersecurity Workforce Gap Challenges New CISA Director

In her first major speech since taking office last month, Cybersecurity and Infrastructure Security Agency Director Jen Easterly called for the cybersecurity community to help the nation overcome the cybersecurity workforce shortages. “I believe we need to be much more ambitious about [the skills gap] and be innovative about figuring out how to inform, educate […]

How Smart Is Your SOAR Platform?
Orchestration and Automation

How Smart Is Your SOAR Platform?

How smart is your Security Orchestration, Automation, and Response (SOAR) platform? The answer to that question is critical to determining how protected your organization is from the next data breach or ransomware attack. Imagine for a moment that you’re sitting in a restaurant between sessions at a major industry conference and you receive an email […]

Are Critical Infrastructures Ready For The New Federal Cybersecurity Standards Initiative?
Cyber Risk Quantification

Are Critical Infrastructures Ready For The New Federal Cybersecurity Standards Initiative?

President Joe Biden signed a National Security Memorandum last week that establishes a new Industrial Control Systems Cybersecurity Initiative to develop a voluntary set of standards for the nation’s critical infrastructure owners and operators. “The primary objective of this Initiative is to defend the United States’ critical infrastructure by encouraging and facilitating deployment of technologies […]

Cyber Risk Quantification

Q&A: Joe Weiss of Applied Control Solutions on Control Systems and Cybersecurity

During a recent ThreatConnect Podcast, Joe Weiss, Managing Partner at Applied Control Solutions gave his insights and thoughts on Control Systems and Cybersecurity issues facing our nation’s critical infrastructures. Joe is an international authority on control system cybersecurity and is currently a member of the International Society of Automation Standards Committee ISA99, Industrial Automation and […]

Cyber Risk Quantification

Q&A: Bob Kolasky of the Department of Homeland Security on Systemic Cyber Risk and Critical Infrastructure

ThreatConnect Podcast host Dan Verton recently had the pleasure of speaking with Bob Kolasky, Director of the National Risk Management Center at the Cybersecurity and Infrastructure Security Agency (CISA) during a recent ThreatConnect Podcast, where he gave his insights on systemic cyber risk and critical infrastructure. There have been nearly a thousand documented and reported […]

Browse More Resources