Skip to main content
ThreatConnect blog

Read insights, thought leadership, and platform updates.

Showing 633 posts
Sort

No Blogs Match Your Results

Please try again or contact marketing@threatconnect.com for more information on our blogs.

Search for anything with the Polarity – Google Custom Search Integration Part 1
Polarity

Search for anything with the Polarity – Google Custom Search Integration Part 1

Today’s post continues an ongoing series on Polarity Integrations. Data tells a story, Polarity helps you see it with Augmented Reality overlaying contextual information from the applications you use every day, no glasses or goggles required. With over 100 powerful integrations, Polarity’s open-source Integrations Library arms you with the right data at the right time […]

SOC Series: Phishing Triage
Polarity

SOC Series: Phishing Triage

Today’s post continues an ongoing series on Polarity Security Operations Center (SOC) use cases; demonstrating how Polarity helps you to see the story in your data without sacrificing thoroughness or speed. According to IBM’s X-Force and Dell Secureworks, Phishing attacks have been the top initial compromise of all breach vectors (i.e. approximately 30%) for the […]

Former CIA Cybersecurity Chief Speaks Out on Solar Winds Hack
Threat Intelligence Operations

Former CIA Cybersecurity Chief Speaks Out on Solar Winds Hack

In an exclusive interview with the ThreatConnect Podcast, Robert Bigman, the former Chief Information Security Officer (CISO) at the CIA, said when investigators complete their analysis into how the Russian intelligence service eluded detection for months, if not years, during the Solar Winds hacks, they will likely find the same types of failures that contributed […]

Cyber Risk Quantification

Risk Quantification, Threat Intelligence & Automation: Stronger Together

ThreatConnect’s marries cyber risk quantification (CRQ), threat intelligence platform (TIP), and SOAR capabilities.

Security Operations

8 Ways SOC & IR Teams Can Use ThreatConnect’s Workflow Capability

ThreatConnect’s Workflow capability enables users to continuously improve security processes with a single Platform for process documentation, team collaboration, and artifact enrichment. With Workflow, teams gain efficiencies by streamlining and automating discovery, investigation, monitoring, and response activities. This blog will go over some common use cases SOC and IR teams can accomplish leveraging ThreatConnect Workflow. […]

ThreatConnect Platform

How to Use Workflow to Conduct Phishing Analysis Part 2 – Automating Phase 1

While most organizations (88% in 2019 according to ProofPoint’s State of the Phish 2020 report) are targeted by spear phishing emails each year, the processes by which these messages are triaged and analyzed varies from company to company. In some cases, phishing analysis is the responsibility of the security operations center or incident response team. […]

Threat Intelligence Operations

Why Your SOAR Needs Threat Intel Management, Not Feed Management

When it comes to using threat intelligence to aid in the investigation of alerts or phishing, it’s essential to have the right feeds (whether OSINT or paid). We often get asked, “can I just dump feeds right into my SOAR platform?” This is an evolution of a question that’s been going on for some time: […]

ThreatConnect Platform

Tracking Sunburst-Related Activity with ThreatConnect Dashboards

Recently FireEye discovered that the SolarWinds Orion IT monitoring platform was compromised earlier this year. The threat actor used SolarWinds cryptographic keys to sign multiple backdoored files posing as Orion IT updates. These files contained a hidden backdoor that would communicate via HTTP to external servers after remaining dormant for up to 2 weeks. The […]

Threat Intelligence Operations

Tactical Threat Hunting (Part 1): Providing the information that matters, when it matters.

This is part 1 of a 2 part series. In a previous article,  “SOAR: An Incident Responder’s Best Friend,”  we discussed the issues facing Incident Responders today and how Security Orchestration, Automation, and Response (SOAR) can help to reduce alert fatigue while providing faster, more timely responses.  In this article we are going to expand […]

ThreatConnect Insights Uncategorized

Infrastructure Research and Hunting: Boiling the Domain Ocean

The Diamond Model of Intrusion Analysis identifies two main nodes as actor assets that may ultimately interact with a target / victim’s own assets — capabilities and infrastructure. But while “exploitation” is usually considered something the adversary does, it works both ways as threat intelligence researchers and defenders in general can exploit the discoverable characteristics […]

ThreatConnect Platform

ThreatConnect and Cisco Identity Services Engine (ISE): Streamline Security Policy Updates

ThreatConnect and Cisco have partnered to deliver a Playbook app for joint customers to leverage. With this Playbook app, you can control the network status of an endpoint in Cisco ISE. The Cisco Identity Services Engine (ISE) is your one-stop solution to streamline security policy management and reduce operating costs. With ISE, you can see […]

Always Know a Vulnerability’s Weak Point with the Polarity Rapid7 AttackerKB Integration
Polarity

Always Know a Vulnerability’s Weak Point with the Polarity Rapid7 AttackerKB Integration

Today’s post continues an ongoing series on Polarity Integrations. Data tells a story, Polarity helps you see it with Augmented Reality overlaying contextual information from the applications you use every day, no glasses or goggles required. With over 100 powerful integrations, Polarity’s open-source Integrations Library arms you with the right data at the right time […]

Browse More Resources