Skip to main content
ThreatConnect blog

Read insights, thought leadership, and platform updates.

Showing 618 posts
Sort

No Blogs Match Your Results

Please try again or contact marketing@threatconnect.com for more information on our blogs.

Threat Research

ThreatConnect Research Roundup: Spoofing SharePoint

May 13 2020 Edition Howdy, and welcome to the ThreatConnect Research Roundup: Threat Intel Update (blog edition)! Here we will be sharing a collection recent findings by our Research Team, as well as items from open source publications that have resulted in observations of related indicators across ThreatConnect’s CAL™ (Collective Analytics Layer). Note: Viewing the […]

Access the MITRE ATT&CK Framework with Polarity Reference Channels
How-to Guides Polarity

Access the MITRE ATT&CK Framework with Polarity Reference Channels

Today’s post continues an ongoing series on Polarity User Tips. Data tells a story, Polarity helps you see it with Augmented Reality overlaying contextual information as you work, giving you the right data at the right time to make informed decisions and take action with speed. This guide explains how you can see the story […]

Orchestration and Automation Partners

ThreatConnect’s Developer Partner Program: We Meme Business

Integrations have always been at the heart of ThreatConnect’s product and company strategy. Never has that been more true than when we made the decision to move into the SOAR (security orchestration, automation, and response) market: integrations have become even more vital. A broad and open ecosystem of apps and integrations is crucial for the […]

Security Operations

How to Improve Collaboration with Security Teams and Technology using ThreatConnect

ThreatConnect is an intelligence-led, SOAR Platform. We bring a critically important solution to market for our clients as we combine our world-class Threat Intelligence Platform with SOAR under one banner. This ensures that intelligence feeds operations and operations informs intelligence for future actions, continually improving the time to detect and respond to threats. In our […]

Polarity User Tips: Reference Channels
How-to Guides Polarity

Polarity User Tips: Reference Channels

Today’s post continues an ongoing series on Polarity User Tips. Data tells a story, Polarity helps you see it with Augmented Reality overlaying contextual information as you work, giving you the right data at the right time to make informed decisions and take action with speed. This guide explains how you can see the story […]

ThreatConnect Platform

Playbook Fridays: DomainTools Iris Investigate Monitor

Welcome to ThreatConnect’s Playbook Fridays! We will continually publish posts featuring Playbooks (and sometimes Dashboards!) that can be built in the Platform. ThreatConnect developed the Playbooks capability to help analysts automate time consuming and repetitive tasks so they can focus on what is most important. And in many cases, to ensure the analysis process can […]

Security Operations

Improving Accuracy and Efficiency in Security Operations with ThreatConnect

ThreatConnect is the central nervous system for your entire security ecosystem. Our intelligence-driven Security Orchestration Automation and Response (SOAR) Platform is a place for your security team to work smarter, together. As a company, we are driving the evolution of security operations by delivering enriched, fortified, context-filled threat intelligence along with comprehensive analytics, seamless automation […]

How Polarity can help Data Loss Prevention
Polarity

How Polarity can help Data Loss Prevention

Today’s post continues an ongoing series on Polarity Use Cases. With a solution that overlays on any screen you’re looking at, Polarity has as many use cases as you do tasks in your workflow. Using Polarity, you’ll be armed with data awareness and recall so you can make better decisions, faster. This example showcases our […]

SOAR Higher with Polarity
Polarity

SOAR Higher with Polarity

Security Operations Automation & Response (SOAR) platforms are now widely deployed as a way to address an ever-increasing volume of attacks. From automating the response to phishing emails to more sophisticated playbooks, SOAR platforms are producing positive results. Still, security teams recognize that not everything can be automated, and even what can be addressed with […]

React Immediately to Insider Threats with the Polarity-Securonix Integration
Polarity

React Immediately to Insider Threats with the Polarity-Securonix Integration

Today’s post continues an ongoing series on Polarity Integrations. With over 100 powerful integrations, the Polarity Integrations Library allows users to connect Polarity to the tools they already use in their workflow, arming them with even better data awareness and recall. This example showcases our integration with Securonix. Insider threats are one of the fastest-growing risk […]

ThreatConnect Platform

Playbook Fridays: Converting Apps

Welcome to ThreatConnect’s Playbook Fridays! We will continually publish posts featuring Playbooks (and sometimes Dashboards!) that can be built in the Platform. ThreatConnect developed the Playbooks capability to help analysts automate time consuming and repetitive tasks so they can focus on what is most important. And in many cases, to ensure the analysis process can […]

Orchestration and Automation ThreatConnect Platform

Build a Single Source of Truth

Gartner® defines a SOAR platform as ”security orchestration, automation and response technologies that enable organizations to collect security threats data and alerts from different sources, where incident analysis and triage can be performed leveraging a combination of human and machine power to help define, prioritize and drive standardized incident response activities according to a standard […]

Browse More Resources