Skip to main content
ThreatConnect blog

Read insights, thought leadership, and platform updates.

Showing 626 posts
Sort

No Blogs Match Your Results

Please try again or contact marketing@threatconnect.com for more information on our blogs.

Orchestration and Automation

5 Ways An Intelligence-Driven SOAR Platform Can Help Your SecOps Team

An intelligence-driven SOAR Platform empowers SecOps teams to work smarter not harder so that they can make better operational decisions and find the most effective strategies. When resources are scarce, it’s imperative that security teams find and use technologies that will help them streamline processes to reduce the complexity of their jobs. Intelligence on adversarial […]

A Penny For Your Thoughts — What’s New in CAL 2.9
ThreatConnect Platform

A Penny For Your Thoughts — What’s New in CAL 2.9

I’ve always said that IOC’s are like pennies in the currency of intelligence — annoying to deal with, but en masse they can add up to something big.  Sometimes you won’t know what you have until you start flipping over the proverbial couch cushions of your organization’s log files, scan results, and so on. If […]

Inside Today’s SOC: More Spending, Fewer Skilled Staff, Less Capability
Security Operations

Inside Today’s SOC: More Spending, Fewer Skilled Staff, Less Capability

Security Operations Center (SOC) teams are being stretched to the breaking point. Although global cybersecurity spending continues to grow at a record pace, eclipsing investments in many other areas of technology, risk management, and operational infrastructure, few security operations centers are achieving the meaningful and demonstrable results that Chief Information Security Officers (CISOs) are hoping […]

Cybersecurity Workforce Gap Challenges New CISA Director
Orchestration and Automation

Cybersecurity Workforce Gap Challenges New CISA Director

In her first major speech since taking office last month, Cybersecurity and Infrastructure Security Agency Director Jen Easterly called for the cybersecurity community to help the nation overcome the cybersecurity workforce shortages. “I believe we need to be much more ambitious about [the skills gap] and be innovative about figuring out how to inform, educate […]

How Smart Is Your SOAR Platform?
Orchestration and Automation

How Smart Is Your SOAR Platform?

How smart is your Security Orchestration, Automation, and Response (SOAR) platform? The answer to that question is critical to determining how protected your organization is from the next data breach or ransomware attack. Imagine for a moment that you’re sitting in a restaurant between sessions at a major industry conference and you receive an email […]

Are Critical Infrastructures Ready For The New Federal Cybersecurity Standards Initiative?
Cyber Risk Quantification

Are Critical Infrastructures Ready For The New Federal Cybersecurity Standards Initiative?

President Joe Biden signed a National Security Memorandum last week that establishes a new Industrial Control Systems Cybersecurity Initiative to develop a voluntary set of standards for the nation’s critical infrastructure owners and operators. “The primary objective of this Initiative is to defend the United States’ critical infrastructure by encouraging and facilitating deployment of technologies […]

Cyber Risk Quantification

Q&A: Joe Weiss of Applied Control Solutions on Control Systems and Cybersecurity

During a recent ThreatConnect Podcast, Joe Weiss, Managing Partner at Applied Control Solutions gave his insights and thoughts on Control Systems and Cybersecurity issues facing our nation’s critical infrastructures. Joe is an international authority on control system cybersecurity and is currently a member of the International Society of Automation Standards Committee ISA99, Industrial Automation and […]

Cyber Risk Quantification

Q&A: Bob Kolasky of the Department of Homeland Security on Systemic Cyber Risk and Critical Infrastructure

ThreatConnect Podcast host Dan Verton recently had the pleasure of speaking with Bob Kolasky, Director of the National Risk Management Center at the Cybersecurity and Infrastructure Security Agency (CISA) during a recent ThreatConnect Podcast, where he gave his insights on systemic cyber risk and critical infrastructure. There have been nearly a thousand documented and reported […]

ThreatConnect Platform

ThreatConnect Supports MITRE ATT&CK Groups and Software

ThreatConnect now supports MITRE ATT&CK Groups and Software within our Platform! Before we dive too deep, let’s define Groups and Software in MITRE ATT&CK. What are Groups? Groups are sets of related intrusion activities tracked by a common name in the security community. Analysts follow clusters of activities using various analytic methodologies and terms such […]

ThreatConnect and Amazon GuardDuty:  Protection for your AWS Environment
ThreatConnect Platform

ThreatConnect and Amazon GuardDuty: Protection for your AWS Environment

ThreatConnect has built 3 new Apps to work seamlessly with Amazon GuardDuty. Amazon GuardDuty is a threat detection service that continuously monitors for malicious activity and unauthorized behavior in your AWS accounts, workloads, and data stored in Amazon S3. With these Apps, any known IP addresses (good and bad) can be set up for monitoring […]

Cyber Risk Quantification

Q&A: AVEVA’s Tim Grieveson on Cyber Risk Management and Critical Infrastructure

During a recent ThreatConnect Podcast, Tim Grieveson, Chief Information Security Officer (CISO) at AVEVA, gave his insights and thoughts on cyber risk management issues facing our nation’s critical infrastructures. The recent surge in cyberattacks targeting critical infrastructure companies demonstrates the urgent need for critical infrastructure owners and operators to adopt a risk-led cybersecurity program. It […]

Cyber Risk Quantification

Q&A: Felicia Thorpe of AHT Insurance on Cyber Insurance and Cyber Risk Quantification

During a recent ThreatConnect webinar, Felicia Thorpe, Managing Advisor at AHT Insurance, offered her insights on the latest trends in the cyber insurance market and changes that need to be considered to battle the surge in ransomware attacks. The increasing sophistication and cost of cyberattacks, particularly ransomware, have led to a massive jump in demand […]

Browse More Resources