Skip to main content
ThreatConnect blog

Read insights, thought leadership, and platform updates.

Showing 633 posts
Sort

No Blogs Match Your Results

Please try again or contact marketing@threatconnect.com for more information on our blogs.

Announcing the Polarity Community Contributor of the Quarter, September 2020
Polarity

Announcing the Polarity Community Contributor of the Quarter, September 2020

We would like to congratulate Shawn Thomas, SOC Manager at Verizon Media with The Paranoids and host of the Detections Podcast, as the Polarity Community Contributor of the quarter! Shawn has greatly helped Polarity build its product roadmap and understand how to improve the Polarity experience for everyone. We encourage all of our Polarity Community […]

Polarity User Tips: Using Annotations in Polarity
How-to Guides Polarity

Polarity User Tips: Using Annotations in Polarity

Today’s post continues an ongoing series on Polarity User Tips. Data tells a story, Polarity helps you see it with Augmented Reality overlaying contextual information as you work, giving you the right data at the right time to make informed decisions and take action with speed (no glasses or goggles required). This guide explains how […]

Open Season: Hunting Adversaries with Polarity and HYAS
Polarity

Open Season: Hunting Adversaries with Polarity and HYAS

This is a recording of Community Tech Tuesday, where you’ll hear from Polarity and our integration partner, HYAS. We go light on slideware so we can focus on live product demo and Q&A. It’s a great way to see how Polarity and HYAS can help you to see the story in your data with Augmented Reality […]

Threat Research

Research Roundup: FBI/NSA Fancy Bear Report Followup

Howdy, and welcome to the ThreatConnect Research Roundup, a collection of recent findings by our Research Team and items from open source publications that have resulted in Observations of related indicators across ThreatConnect’s CAL™ (Collective Analytics Layer). Note: Viewing the pages linked in this blog post requires a ThreatConnect account. In this edition, we cover: […]

Incident Response Orchestration and Automation

SOAR: An Incident Responder’s Best Friend

Decrease Time to Response and Remediation with SOAR As an Incident Responder (IR), it doesn’t seem to matter how quickly you solve an issue nor if the case or ticket comes to you with no additional information. You are constantly told to “move faster.” You’re flooded with tickets, incidents and cases – but often times […]

Uncategorized

ThreatConnect and Okta: Save time with IAM Investigations

ThreatConnect has partnered with Okta, a leader in the Identity and Access Management (IAM) space, to deliver a Playbook App for joint customers. This App allows you to automate processes during an internal security investigation when it’s critical to quickly get user information or suspend users involved with a security incident. Let’s dive in. The […]

ThreatConnect Platform

ThreatConnect and Microsoft Graph: Integrate Seamlessly with the Microsoft Stack

We’ve got big news! ThreatConnect now integrates with Microsoft Graph, allowing ThreatConnect customers to connect with nearly any piece of Microsoft technology. This integration acts as a communication bridge between the ThreatConnect Platform and the Microsoft portfolio.

ThreatConnect Platform

Playbook Fridays: Arithmetic Functions Component

Welcome to ThreatConnect’s Playbook Fridays! We will continually publish posts featuring Playbooks (and sometimes Dashboards!) that can be built in the Platform. ThreatConnect developed the Playbooks capability to help analysts automate time consuming and repetitive tasks so they can focus on what is most important. And in many cases, to ensure the analysis process can […]

Threat Research

Research Roundup: Suspicious Domain Redirects to Google Account Security Page

Howdy, and welcome to the ThreatConnect Research Roundup, a collection of recent findings by our Research Team and items from open source publications that have resulted in Observations of related indicators across ThreatConnect’s CAL™ (Collective Analytics Layer). Note: Viewing the pages linked in this blog post requires a ThreatConnect account. In this edition, we cover: […]

ThreatConnect Platform

ThreatConnect and Twilio: Supporting human in the loop orchestration and SMS notifications

A new integration with Twilio Programmable SMS was recently released and brings even more opportunities for collaboration and messaging to ThreatConnect Playbooks. This Playbook App provides actions to send SMS messages and check their status from ThreatConnect Playbooks. These actions can be part of many security processes where notifying a team member of an escalation […]

ThreatConnect Platform

Research Roundup: Recent Probable Charming Kitten Infrastructure

Howdy, and welcome to the ThreatConnect Research Roundup, a collection of recent findings by our Research Team and items from open source publications that have resulted in Observations of related indicators across ThreatConnect’s CAL™ (Collective Analytics Layer). Note: Viewing the pages linked in this blog post requires a ThreatConnect account. In this edition, we cover: […]

Being Thorough or Working Fast: Which Matters Most in Security?
Polarity

Being Thorough or Working Fast: Which Matters Most in Security?

Being thorough or working fast: which matters most in security? Most analysts will tell you that they balance between being thorough and getting the job done quickly. We asked the security community to weigh in on this debate. Our CEO, Paul Battista, joined Security Weekly’s Hacker Summer Camp to share what they thought and explain why it’s […]

Browse More Resources