Skip to main content
ThreatConnect blog

Read insights, thought leadership, and platform updates.

Showing 618 posts
Sort

No Blogs Match Your Results

Please try again or contact marketing@threatconnect.com for more information on our blogs.

Threat Research

Research Roundup: FBI/NSA Fancy Bear Report Followup

Howdy, and welcome to the ThreatConnect Research Roundup, a collection of recent findings by our Research Team and items from open source publications that have resulted in Observations of related indicators across ThreatConnect’s CAL™ (Collective Analytics Layer). Note: Viewing the pages linked in this blog post requires a ThreatConnect account. In this edition, we cover: […]

Incident Response Orchestration and Automation

SOAR: An Incident Responder’s Best Friend

Decrease Time to Response and Remediation with SOAR As an Incident Responder (IR), it doesn’t seem to matter how quickly you solve an issue nor if the case or ticket comes to you with no additional information. You are constantly told to “move faster.” You’re flooded with tickets, incidents and cases – but often times […]

Uncategorized

ThreatConnect and Okta: Save time with IAM Investigations

ThreatConnect has partnered with Okta, a leader in the Identity and Access Management (IAM) space, to deliver a Playbook App for joint customers. This App allows you to automate processes during an internal security investigation when it’s critical to quickly get user information or suspend users involved with a security incident. Let’s dive in. The […]

ThreatConnect Platform

ThreatConnect and Microsoft Graph: Integrate Seamlessly with the Microsoft Stack

We’ve got big news! ThreatConnect now integrates with Microsoft Graph, allowing ThreatConnect customers to connect with nearly any piece of Microsoft technology. This integration acts as a communication bridge between the ThreatConnect Platform and the Microsoft portfolio.

ThreatConnect Platform

Playbook Fridays: Arithmetic Functions Component

Welcome to ThreatConnect’s Playbook Fridays! We will continually publish posts featuring Playbooks (and sometimes Dashboards!) that can be built in the Platform. ThreatConnect developed the Playbooks capability to help analysts automate time consuming and repetitive tasks so they can focus on what is most important. And in many cases, to ensure the analysis process can […]

Threat Research

Research Roundup: Suspicious Domain Redirects to Google Account Security Page

Howdy, and welcome to the ThreatConnect Research Roundup, a collection of recent findings by our Research Team and items from open source publications that have resulted in Observations of related indicators across ThreatConnect’s CAL™ (Collective Analytics Layer). Note: Viewing the pages linked in this blog post requires a ThreatConnect account. In this edition, we cover: […]

ThreatConnect Platform

ThreatConnect and Twilio: Supporting human in the loop orchestration and SMS notifications

A new integration with Twilio Programmable SMS was recently released and brings even more opportunities for collaboration and messaging to ThreatConnect Playbooks. This Playbook App provides actions to send SMS messages and check their status from ThreatConnect Playbooks. These actions can be part of many security processes where notifying a team member of an escalation […]

ThreatConnect Platform

Research Roundup: Recent Probable Charming Kitten Infrastructure

Howdy, and welcome to the ThreatConnect Research Roundup, a collection of recent findings by our Research Team and items from open source publications that have resulted in Observations of related indicators across ThreatConnect’s CAL™ (Collective Analytics Layer). Note: Viewing the pages linked in this blog post requires a ThreatConnect account. In this edition, we cover: […]

Being Thorough or Working Fast: Which Matters Most in Security?
Polarity

Being Thorough or Working Fast: Which Matters Most in Security?

Being thorough or working fast: which matters most in security? Most analysts will tell you that they balance between being thorough and getting the job done quickly. We asked the security community to weigh in on this debate. Our CEO, Paul Battista, joined Security Weekly’s Hacker Summer Camp to share what they thought and explain why it’s […]

Orchestration and Automation ThreatConnect Platform

Improving Team Retention with SOAR

ThreatConnect’s intelligence driven Security, Orchestration, Automation & Response (SOAR) Platform can help organizations address the issues of training and retention. It acts as a process management system to enable faster, more effective, and lower cost on-boarding because best practices and optimized workflows are incorporated and structured to make it easier for new as well as […]

Incident Response Security Operations

ThreatConnect and Shodan: Enrich threat data to enhance decision making

ThreatConnect and Shodan have partnered to deliver the Shodan Playbook App. This app allows you to retrieve multiple types of enrichment information for IOCs. Additionally,  it allows you to craft custom Shodan searches to retrieve result sets based on factors such as software versions being run, services running, open ports, and more. You can even […]

ThreatConnect Platform

Black Hat 2020 Sessions Not to be Missed!

It’s that time again – yep, August. And you know what that means: Black Hat! Vegas! Swag. Great speakers. Putting your Fitbit to WORK in the Mandalay Bay! Oh, and the heat. Oh…wait, it is 2020… This year, Black Hat 2020 is virtual. Still great speakers. Still great sessions. Still booths to “stop by”. Still […]

Browse More Resources