Read insights, thought leadership, and platform updates.
No Blogs Match Your Results
Please try again or contact marketing@threatconnect.com for more information on our blogs.
Importance of Automation in Event Prioritization
Event prioritization means organizing your events and picking the most important items to address first. The reason for this is simple and hopefully obvious: you want to identify which event is more important to you to help you determine which task/event you want to commit to first and where immediate attention is required. How importance […]
Cyberattacks on Critical Infrastructures Forcing Long Overdue Conversations About Risk
A cyberattack targeting the world’s largest meat processor over the weekend is pointing to a disturbing new reality: Our nation’s critical infrastructures and supply chains are being targeted because they have not identified the cyber risks that matter most to their operations. JBS USA announced Sunday that it was the victim of an organized cyberattack […]
3 Reasons The Insurance Industry Desperately Needs Automated Cyber Risk Quantification
The cyber insurance industry is in turmoil as more and more businesses seek insurance protection against the onslaught of advanced threats, particularly ransomware, while both carriers and those seeking insurance lack the ability to automate risk and financial models to calculate security control improvements, improve response times and reduce exposure. The increasing sophistication and cost […]
The ROI of Security and the SOC
The Return on Investment of any cybersecurity investment does not fall under the traditional definition of ROI. Cybersecurity is a pure cost center – in an average organization no revenue can ever be derived from it, and it represents a significant cost. In order to calculate an ROI figure for such a cost center, we […]
Inside The Business Benefits of Automated Cyber Risk Quantification
Many businesses may have heard of cyber risk quantification (CRQ), but most businesses still don’t know what their exposure is to any given cyber event. And how could they when their security teams are presented with thousands of Common Vulnerabilities and Exposures (CVEs) that all have the highest severity rating? One of our most important […]
ThreatConnect and Freshservice: Better Ticket Management
ThreatConnect has released a Playbook App for joint customers to leverage Freshservice. With this new Playbook App, you can easily manage or create tickets in Freshservice from ThreatConnect. Repeatable and mundane tasks like copy and pasting information from ThreatConnect to Freshservice or opening a Freshservice ticket can now be completely automated. Freshservice Playbook App Through […]
Improve SOC Event Prioritization With Intelligence-Driven SOAR
Information overload is a common challenge facing Security Operations Centers (SOCs). Security analysts are bombarded with alerts of potential security events. Sifting through and prioritizing the most important events can take weeks, months, or even longer. Without the insight of threat intelligence and orchestrated processes to make sense of all the data coming through, analysts […]
ThreatConnect and RiskIQ PassiveTotal: Better Enrichment Capabilities with PassiveTotal
ThreatConnect is pleased to deliver a Playbook App for joint customers to leverage RiskIQ PassiveTotal capabilities within the ThreatConnect Platform. With this app, you can query PassiveTotal for enrichment information on various indicators of compromise (IOC) types. By automating this process, you bring relevant, timely, and accurate threat intelligence into ThreatConnect and use it to […]
ThreatConnect: Helping to Deliver on the Promise of XDR
Editor’s Note: In this first of two articles, ThreatConnect’s Director of Security Architecture Chris Adams breaks down the primary requirements of an XDR as defined by Gartner, and provides a bit of color as to why those are important and how ThreatConnect meets them, sometimes with integration partners. On the surface, it’s no surprise […]
ThreatConnect’s New Whitepaper is a Must-Read For CISOs and SOC Directors
Chief Information Security Officers have more data on cyber threats and vulnerabilities than ever before. However, the majority of them still struggle to explain risk to their C-suite and boardroom counterparts in language-centered on business impact and financial risk. One of the most critical challenges facing CISOs today is this inability to understand the core […]
Biden Executive Order on Cybersecurity Aligns With Risk, Threat, Response Approach
Amid the lingering shadow of the Colonial Pipeline ransomware attack, President Biden signed an executive order last week that outlines “bold changes” that overall take a risk-led approach to cybersecurity and attempt to bridge the gap between cyber threat intelligence and operations. “Incremental improvements will not give us the security we need; instead, the Federal […]
Alleviate Common SOC Struggles With SOAR Power
The cyber threat landscape is changing so rapidly that it can become almost impossible for security operations center (SOC) teams to keep up. Every day, analysts make multiple decisions that have the potential to impact the entire organization. Once faced with a threat, analysts have to quickly answer questions such as: What should I do […]