Read insights, thought leadership, and platform updates.
No Blogs Match Your Results
Please try again or contact marketing@threatconnect.com for more information on our blogs.
ThreatConnect and Digital Shadows: Give Your Playbooks a SearchLight
ThreatConnect has improved our existing integration with Digital Shadows SearchLight. With these updates, multiple types of data like social media posts, pastes, dark web pages, technical information like DNS, and more can be found via Shadow Search and brought into ThreatConnect for further analysis. These new capabilities allow you to increase accuracy and efficiency by […]
ThreatConnect Announces New Integrations With Four Free Tools
ThreatConnect is happy to announce new ThreatConnect Playbook app integrations with free tools that many security teams use as part of their routine operations. We knew that our customers needed these integrations so we didn’t hesitate to build them out. These tools, when combined with the power of ThreatConnect Playbooks and Workflows, will allow your […]
ThreatConnect and Sumo Logic: Empower Orchestration with Cloud-SIEM
ThreatConnect and Sumo Logic have partnered to deliver a new Playbook app. With this app, SOC analysts can automate searches for events in Sumo Logic and use these searches to do things like retroactive threat hunting or enriching an investigation with important Sumo Logic data. By automating these processes, you allow your team to work […]
The New Role of the CISO: Create and Protect Business Value
There is a tendency in the cybersecurity industry to conflate tactical changes in the threat landscape with structural and strategic imperatives that are fundamentally altering the role and responsibilities of chief information security officers (CISOs). Today’s CISOs must do more than protect systems and data from the latest threats; they must become business enablers and […]
Introducing ThreatConnect 6.1: The Tao of Intel-Driven Operations
This was one of the first graphics we created for the ThreatConnect Platform, but it’s one that’s still very meaningful to our latest release. It may seem quaint, and the graphics have certainly improved over the years, but the vision remains the same: threat intelligence can guide security operations towards better decisions, and security operations […]
SolarWinds Hack Spurs Interest In Risk-Based Threat Hunting
The SolarWinds hack of the software supply chain, which is considered the most significant and far-reaching cyber espionage operation targeting the U.S. government to date, has elevated the government’s interest in risk-based threat hunting. The Cybersecurity and Infrastructure Security Agency (CISA) last month issued a request for information on industry’s ability to support a Threat […]
Threat Hunting Use Case (Video): Sunburst Malware
The SolarWinds attack, disclosed by security firm FireEye and Microsoft in December, may have breached as many as 18,000 government and private sector organizations. It has been characterized as the largest and most sophisticated cyber attack the world has ever seen, and was made possible by the Sunburst malware the attackers implanted in legitimate digitally […]
Harness the Power of Your Digital Shadows Data without Breaking Your Workflow
Today’s post continues an ongoing series on Polarity Integrations. Data tells a story, Polarity helps you see it with Augmented Reality overlaying contextual information from the applications you use every day, no glasses or goggles required. With over 100 powerful integrations, Polarity’s open-source Integrations Library arms you with the right data at the right time […]
Improving Upon The FAIR Standard’s Time-to-Value
The Factor Analysis of Information Risk (FAIR) is the de facto standard quantitative model for information security and operational risk. And while FAIR continues to have a positive impact on how security professionals think about and communicate risk, the upfront costs associated with starting a FAIR program and the time it takes to realize actual […]
ThreatConnect and Malwarebytes Nebula: Make Your Cloud-Based EDR SOAR
ThreatConnect is pleased to deliver a Playbook app for joint customers to leverage Malwarebytes Nebula. Malwarebytes Nebula is a cloud-hosted security operations platform that allows you to manage control of any malware or ransomware incident. With this Playbook App, you can take immediate action to investigate, stop, and remediate potential threats at the endpoint based […]
Communicating Risk, Threat, Response to the C-Suite & Board
The Wannacry ransomware attack made 2017 one of the worst years for cybersecurity in recent memory, incapacitating hundreds of thousands of computers in 150 countries and causing billions of dollars in financial losses. There was also a silver lining: Suddenly, senior business executives and boards of directors began asking detailed questions about how much cyber […]
Key Functionalities of a Modern Cyber Threat Intelligence Program
More and more organizations, both large and small, are beginning to realize the benefits of creating a cyber threat intelligence (CTI) program. In fact, 85 percent of the organizations surveyed in the 2021 SANS Cyber Threat Intelligence Survey said they produce or consume CTI — a 7 percent increase over last year. But a modern […]