Skip to main content
ThreatConnect blog

Read insights, thought leadership, and platform updates.

Showing 633 posts
Sort

No Blogs Match Your Results

Please try again or contact marketing@threatconnect.com for more information on our blogs.

Cyber-Risk Quantification is the Icing on the Cake for Security Frameworks
Cyber Risk Quantification

Cyber-Risk Quantification is the Icing on the Cake for Security Frameworks

Today, we thought we would have a little fun talking about security frameworks and how cyber risk quantification is the missing ingredient you need to cook up more mature security models.  Security frameworks are similar to cookbooks with progressively more complex recipes to help security leaders entertain more discerning guests. In addition to calling out […]

GreyNoise and ThreatConnect: Protect against Noisy IPs
ThreatConnect Platform

GreyNoise and ThreatConnect: Protect against Noisy IPs

ThreatConnect has released a new GreyNoise Playbook App. GreyNoise helps analysts quickly understand which alerts don’t matter by providing context on noisy IP addresses across the internet. With this playbook app, you can look up IP addresses to validate if they are involved in any mass scanning or exploit activity, to more effectively triage alerts.  […]

Orchestration and Automation

Detect and Contain Cyberattacks Faster With Intelligence-Driven SOAR

When it comes to containing cyberattacks and limiting their ability to cause harm within your environment, time is money. On average, a company able to detect and contain a breach in less than 200 days will spend $1.1 million less than one that needs more time. Yet organizations still struggle to respond to security events […]

Cyber Risk Quantification

Risk Calculations Require Cyber Threat Intelligence

Businesses seeking to understand their risk exposure need to realize that they can’t adequately quantify risk without cyber threat intelligence on the capabilities, intentions, and most frequently employed techniques and tactics of present-day adversaries. In order for quantitative risk calculations to be both accurate and actionable, they must incorporate contextual knowledge into their determinations of […]

Why Effective Cybersecurity Narratives Are Built Using Quantitative Metrics
Cyber Risk Quantification

Why Effective Cybersecurity Narratives Are Built Using Quantitative Metrics

As the world begins to get the global coronavirus pandemic under control, cybersecurity concerns are increasing. Attackers continue to build increasingly sophisticated capabilities, deploying them in a precisely targeted and persistent manner and aiming for enterprises’ most valuable and sensitive data. In many cases, these anxieties are underpinned by a climate of general uncertainty. As […]

How Risk Quantification Gives Your Security Team A Leg Up in Patch Management
Cyber Risk Quantification

How Risk Quantification Gives Your Security Team A Leg Up in Patch Management

Two of the major challenges facing most Security Operations Centers (SOCs) are patch management and alert prioritization. However, many organizations struggle with the complexity of keeping up-to-date with the latest vulnerabilities. They receive so many alerts that it becomes a time-draining attempt to sift through and figure out which alerts are the most important. This […]

Orchestration and Automation

Importance of Automation in Event Prioritization

Event prioritization means organizing your events and picking the most important items to address first. The reason for this is simple and hopefully obvious: you want to identify which event is more important to you to help you determine which task/event you want to commit to first and where immediate attention is required. How importance […]

Cyberattacks on Critical Infrastructures Forcing Long Overdue Conversations About Risk
Cyber Risk Quantification

Cyberattacks on Critical Infrastructures Forcing Long Overdue Conversations About Risk

A cyberattack targeting the world’s largest meat processor over the weekend is pointing to a disturbing new reality: Our nation’s critical infrastructures and supply chains are being targeted because they have not identified the cyber risks that matter most to their operations. JBS USA announced Sunday that it was the victim of an organized cyberattack […]

3 Reasons The Insurance Industry Desperately Needs Automated Cyber Risk Quantification
Cyber Risk Quantification

3 Reasons The Insurance Industry Desperately Needs Automated Cyber Risk Quantification

The cyber insurance industry is in turmoil as more and more businesses seek insurance protection against the onslaught of advanced threats, particularly ransomware, while both carriers and those seeking insurance lack the ability to automate risk and financial models to calculate security control improvements, improve response times and reduce exposure. The increasing sophistication and cost […]

The ROI of Security and the SOC
Security Operations

The ROI of Security and the SOC

The Return on Investment of any cybersecurity investment does not fall under the traditional definition of ROI. Cybersecurity is a pure cost center – in an average organization no revenue can ever be derived from it, and it represents a significant cost. In order to calculate an ROI figure for such a cost center, we […]

Inside The Business Benefits of Automated Cyber Risk Quantification
Cyber Risk Quantification

Inside The Business Benefits of Automated Cyber Risk Quantification

Many businesses may have heard of cyber risk quantification (CRQ), but most businesses still don’t know what their exposure is to any given cyber event. And how could they when their security teams are presented with thousands of Common Vulnerabilities and Exposures (CVEs) that all have the highest severity rating? One of our most important […]

ThreatConnect Platform

ThreatConnect and Freshservice: Better Ticket Management

ThreatConnect has released a Playbook App for joint customers to leverage Freshservice. With this new Playbook App, you can easily manage or create tickets in Freshservice from ThreatConnect. Repeatable and mundane tasks like copy and pasting information from ThreatConnect to Freshservice or opening a Freshservice ticket can now be completely automated. Freshservice Playbook App Through […]

Browse More Resources