Skip to main content
ThreatConnect blog

Read insights, thought leadership, and platform updates.

Showing 626 posts
Sort

No Blogs Match Your Results

Please try again or contact marketing@threatconnect.com for more information on our blogs.

ThreatConnect and Amazon S3 and EC2: Better Manage Cloud Infrastructure
ThreatConnect Platform

ThreatConnect and Amazon S3 and EC2: Better Manage Cloud Infrastructure

ThreatConnect has built new integrations to work with Amazon’s cloud infrastructure. With these integrations, you can more easily monitor and protect your AWS environment.  Amazon Simple Storage Service (S3)  is a service offered by Amazon Web Services that provides object storage through a web service interface. Amazon S3 uses the same scalable storage infrastructure that […]

Big Changes are Coming to the Cyber Insurance Industry
Cyber Risk Quantification

Big Changes are Coming to the Cyber Insurance Industry

The surge in ransomware and other advanced cyber attacks during the last 18 months has led to significant changes in the way insurance carriers approach cyber policies and those changes are far from over. For more than two decades, insurance companies have been issuing cyber policies with little to no verification of a client’s cybersecurity […]

ThreatConnect Platform

Risk-Threat-Response: The Rosetta Stone for Communicating Cyber Risk

Many security leaders struggle with communicating cyber risk in business and operational terms that matter to C-suite executives and boards of directors. This miscommunication is one of the biggest hurdles faced by many security leaders. Security leaders need a way to translate cyber risk into terms that business executives can understand. When both security and […]

Introducing Playbooks 2.0 and Intelligence Anywhere: Creating a Foundation of Collaboration with ThreatConnect 6.2
Competitive Differentiation Intelligence Anywhere

Introducing Playbooks 2.0 and Intelligence Anywhere: Creating a Foundation of Collaboration with ThreatConnect 6.2

ThreatConnect 6.2 introduces Intelligence Anywhere and Playbooks 2.0 for improved ease of use and collaboration. When we think of “collaboration” we usually think about groups of people working together, maybe from different teams, to achieve a common goal. In cybersecurity, that may mean the threat intelligence team provides much-needed context to the SOC, or the […]

Competitive Differentiation Intelligence Anywhere

Introducing Playbooks 2.0 and Browser Extension: Creating a Foundation of Collaboration with ThreatConnect 6.2

ThreatConnect 6.2 introduces a new Browser Extension and Playbooks 2.0 for improved ease of use and collaboration. When we think of “collaboration” we usually think about groups of people working together, maybe from different teams, to achieve a common goal. In cybersecurity, that may mean the threat intelligence team provides much-needed context to the SOC, […]

Cyber-Risk Quantification is the Icing on the Cake for Security Frameworks
Cyber Risk Quantification

Cyber-Risk Quantification is the Icing on the Cake for Security Frameworks

Today, we thought we would have a little fun talking about security frameworks and how cyber risk quantification is the missing ingredient you need to cook up more mature security models.  Security frameworks are similar to cookbooks with progressively more complex recipes to help security leaders entertain more discerning guests. In addition to calling out […]

GreyNoise and ThreatConnect: Protect against Noisy IPs
ThreatConnect Platform

GreyNoise and ThreatConnect: Protect against Noisy IPs

ThreatConnect has released a new GreyNoise Playbook App. GreyNoise helps analysts quickly understand which alerts don’t matter by providing context on noisy IP addresses across the internet. With this playbook app, you can look up IP addresses to validate if they are involved in any mass scanning or exploit activity, to more effectively triage alerts.  […]

Orchestration and Automation

Detect and Contain Cyberattacks Faster With Intelligence-Driven SOAR

When it comes to containing cyberattacks and limiting their ability to cause harm within your environment, time is money. On average, a company able to detect and contain a breach in less than 200 days will spend $1.1 million less than one that needs more time. Yet organizations still struggle to respond to security events […]

Cyber Risk Quantification

Risk Calculations Require Cyber Threat Intelligence

Businesses seeking to understand their risk exposure need to realize that they can’t adequately quantify risk without cyber threat intelligence on the capabilities, intentions, and most frequently employed techniques and tactics of present-day adversaries. In order for quantitative risk calculations to be both accurate and actionable, they must incorporate contextual knowledge into their determinations of […]

Why Effective Cybersecurity Narratives Are Built Using Quantitative Metrics
Cyber Risk Quantification

Why Effective Cybersecurity Narratives Are Built Using Quantitative Metrics

As the world begins to get the global coronavirus pandemic under control, cybersecurity concerns are increasing. Attackers continue to build increasingly sophisticated capabilities, deploying them in a precisely targeted and persistent manner and aiming for enterprises’ most valuable and sensitive data. In many cases, these anxieties are underpinned by a climate of general uncertainty. As […]

How Risk Quantification Gives Your Security Team A Leg Up in Patch Management
Cyber Risk Quantification

How Risk Quantification Gives Your Security Team A Leg Up in Patch Management

Two of the major challenges facing most Security Operations Centers (SOCs) are patch management and alert prioritization. However, many organizations struggle with the complexity of keeping up-to-date with the latest vulnerabilities. They receive so many alerts that it becomes a time-draining attempt to sift through and figure out which alerts are the most important. This […]

Orchestration and Automation

Importance of Automation in Event Prioritization

Event prioritization means organizing your events and picking the most important items to address first. The reason for this is simple and hopefully obvious: you want to identify which event is more important to you to help you determine which task/event you want to commit to first and where immediate attention is required. How importance […]

Browse More Resources