Read insights, thought leadership, and platform updates.
No Blogs Match Your Results
Please try again or contact marketing@threatconnect.com for more information on our blogs.
Get Even Better Data Awareness & Recall with the Updated Polarity-ThreatQuotient Integration
Today’s post continues an ongoing series on Polarity Integrations. Data tells a story, Polarity helps you see it with Augmented Reality overlaying contextual information from the applications you use every day, no glasses or goggles required. With over 100 powerful integrations, Polarity’s open-source Integrations Library arms you with the right data at the right time […]
Empowering Teams with Data Awareness
Polarity Gives you Superhuman Data Awareness & Recall Polarity is software-based Augmented Reality for your data. That means superior Data Awareness and Recall for your team. In this post, we break down what we mean by “Data Awareness”. Empowering Teams with Data Awareness Having the right data to make an informed decision is Data Awareness. It’s about […]
Enabling Teams with Data Recall
Polarity Gives you Superhuman Data Awareness & Recall Polarity is software-based Augmented Reality for your data. That means superior Data Awareness and Recall for your team. In this post, we break down what we mean by “Data Recall”. Enabling Teams with Data Recall Perfect Data Awareness doesn’t matter much if it isn’t there exactly when you need it. Getting […]
ThreatConnect Research Roundup: Probable Sandworm Infrastructure
June 12 2020 Edition Howdy, and welcome to the ThreatConnect Research Roundup, a collection of recent findings by our Research Team and items from open source publications that have resulted in Observations of related indicators across ThreatConnect’s CAL™ (Collective Analytics Layer). Note: Viewing the pages linked in this blog post requires a ThreatConnect account. In […]
Announcing the Polarity Community Contributor of the Quarter, June 2020
We would like to congratulate Michael Francess and the Wyndham team as the Polarity Community Contributor of the quarter! Michael and the Wyndham team’s contributions have greatly helped Polarity build its product roadmap and understand how to improve the Polarity experience for everyone. We encourage all of our Polarity Community members to look at opportunities […]
ThreatConnect and Cylance: Better Endpoint Remediation
ThreatConnect has partnered with Blackberry Cylance, a leader in the Endpoint Detection and Response space, and built two Playbook Apps for our joint customers to leverage. With the addition of these new Playbook Apps, immediate actions can be taken to investigate, stop, and remediate potential threats at the endpoint based on external threat intelligence. CylancePROTECT […]
Take a Deep Dive into ThreatConnect’s Workflow Capabilities
Interested in learning more about ThreatConnect’s Workflow capability for case management? With Workflow, you can continuously improve security processes with a single Platform for process documentation, team collaboration, and artifact enrichment. Sure, tell me more… In our most recent product release, we added the Workflow capability to our Platform, which enables analysts and their teams […]
Polarity Reference Channels: Ansible Modules
Today’s post continues an ongoing series on Polarity User Tips. Data tells a story, Polarity helps you see it with Augmented Reality overlaying contextual information as you work, giving you the right data at the right time to make informed decisions and take action with speed (no glasses or goggles required). This guide explains how […]
Do Androids Dream of Electric CALFs?
CAL 2.5 introduces an additional CAL Feed that uses defined criteria to identify NRDs that we believe have been created using a domain generation algorithm (DGA). Just a few short months ago we announced the introduction of CAL Feeds as a part of our CAL 2.4 updates. That release included four new CAL Feeds (CALF), […]
Polarity Reference Channels: Microsoft Bug Check Code References
Today’s post continues an ongoing series on Polarity User Tips. Data tells a story, Polarity helps you see it with Augmented Reality overlaying contextual information as you work, giving you the right data at the right time to make informed decisions and take action with speed (no glasses or goggles required). This guide explains how […]
ThreatConnect Research Roundup: Suspected Naikon DGA Domains
May 28 2020 Edition Howdy, and welcome to the ThreatConnect Research Roundup, a collection of recent findings by our Research Team and items from open source publications that have resulted in Observations of related indicators across ThreatConnect’s CAL™ (Collective Analytics Layer). Note: Viewing the pages linked in this blog post requires a ThreatConnect account. Roundup […]
Strengthen Business and Security Alignment with ThreatConnect
ThreatConnect is changing the way security works and that means better alignment with, and transparency to, the business. ThreatConnect’s intelligence-driven, security operations solutions include both Threat Intelligence (TIP) and Security Orchestration, Automation and Response (SOAR) platforms. These solutions are designed to put intelligence at the core of every security decision, improve the way your security […]