Read insights, thought leadership, and platform updates.
No Blogs Match Your Results
Please try again or contact marketing@threatconnect.com for more information on our blogs.
Announcing the Polarity Community Contributor of the Quarter, September 2020
We would like to congratulate Shawn Thomas, SOC Manager at Verizon Media with The Paranoids and host of the Detections Podcast, as the Polarity Community Contributor of the quarter! Shawn has greatly helped Polarity build its product roadmap and understand how to improve the Polarity experience for everyone. We encourage all of our Polarity Community […]
Polarity User Tips: Using Annotations in Polarity
Today’s post continues an ongoing series on Polarity User Tips. Data tells a story, Polarity helps you see it with Augmented Reality overlaying contextual information as you work, giving you the right data at the right time to make informed decisions and take action with speed (no glasses or goggles required). This guide explains how […]
Open Season: Hunting Adversaries with Polarity and HYAS
This is a recording of Community Tech Tuesday, where you’ll hear from Polarity and our integration partner, HYAS. We go light on slideware so we can focus on live product demo and Q&A. It’s a great way to see how Polarity and HYAS can help you to see the story in your data with Augmented Reality […]
Research Roundup: FBI/NSA Fancy Bear Report Followup
Howdy, and welcome to the ThreatConnect Research Roundup, a collection of recent findings by our Research Team and items from open source publications that have resulted in Observations of related indicators across ThreatConnect’s CAL™ (Collective Analytics Layer). Note: Viewing the pages linked in this blog post requires a ThreatConnect account. In this edition, we cover: […]
SOAR: An Incident Responder’s Best Friend
Decrease Time to Response and Remediation with SOAR As an Incident Responder (IR), it doesn’t seem to matter how quickly you solve an issue nor if the case or ticket comes to you with no additional information. You are constantly told to “move faster.” You’re flooded with tickets, incidents and cases – but often times […]
ThreatConnect and Okta: Save time with IAM Investigations
ThreatConnect has partnered with Okta, a leader in the Identity and Access Management (IAM) space, to deliver a Playbook App for joint customers. This App allows you to automate processes during an internal security investigation when it’s critical to quickly get user information or suspend users involved with a security incident. Let’s dive in. The […]
ThreatConnect and Microsoft Graph: Integrate Seamlessly with the Microsoft Stack
We’ve got big news! ThreatConnect now integrates with Microsoft Graph, allowing ThreatConnect customers to connect with nearly any piece of Microsoft technology. This integration acts as a communication bridge between the ThreatConnect Platform and the Microsoft portfolio.
Playbook Fridays: Arithmetic Functions Component
Welcome to ThreatConnect’s Playbook Fridays! We will continually publish posts featuring Playbooks (and sometimes Dashboards!) that can be built in the Platform. ThreatConnect developed the Playbooks capability to help analysts automate time consuming and repetitive tasks so they can focus on what is most important. And in many cases, to ensure the analysis process can […]
Research Roundup: Suspicious Domain Redirects to Google Account Security Page
Howdy, and welcome to the ThreatConnect Research Roundup, a collection of recent findings by our Research Team and items from open source publications that have resulted in Observations of related indicators across ThreatConnect’s CAL™ (Collective Analytics Layer). Note: Viewing the pages linked in this blog post requires a ThreatConnect account. In this edition, we cover: […]
ThreatConnect and Twilio: Supporting human in the loop orchestration and SMS notifications
A new integration with Twilio Programmable SMS was recently released and brings even more opportunities for collaboration and messaging to ThreatConnect Playbooks. This Playbook App provides actions to send SMS messages and check their status from ThreatConnect Playbooks. These actions can be part of many security processes where notifying a team member of an escalation […]
Research Roundup: Recent Probable Charming Kitten Infrastructure
Howdy, and welcome to the ThreatConnect Research Roundup, a collection of recent findings by our Research Team and items from open source publications that have resulted in Observations of related indicators across ThreatConnect’s CAL™ (Collective Analytics Layer). Note: Viewing the pages linked in this blog post requires a ThreatConnect account. In this edition, we cover: […]
Being Thorough or Working Fast: Which Matters Most in Security?
Being thorough or working fast: which matters most in security? Most analysts will tell you that they balance between being thorough and getting the job done quickly. We asked the security community to weigh in on this debate. Our CEO, Paul Battista, joined Security Weekly’s Hacker Summer Camp to share what they thought and explain why it’s […]