Read insights, thought leadership, and platform updates.
No Blogs Match Your Results
Please try again or contact marketing@threatconnect.com for more information on our blogs.
Take a Deep Dive into ThreatConnect’s Workflow Capabilities
Interested in learning more about ThreatConnect’s Workflow capability for case management? With Workflow, you can continuously improve security processes with a single Platform for process documentation, team collaboration, and artifact enrichment. Sure, tell me more… In our most recent product release, we added the Workflow capability to our Platform, which enables analysts and their teams […]
Polarity Reference Channels: Ansible Modules
Today’s post continues an ongoing series on Polarity User Tips. Data tells a story, Polarity helps you see it with Augmented Reality overlaying contextual information as you work, giving you the right data at the right time to make informed decisions and take action with speed (no glasses or goggles required). This guide explains how […]
Do Androids Dream of Electric CALFs?
CAL 2.5 introduces an additional CAL Feed that uses defined criteria to identify NRDs that we believe have been created using a domain generation algorithm (DGA). Just a few short months ago we announced the introduction of CAL Feeds as a part of our CAL 2.4 updates. That release included four new CAL Feeds (CALF), […]
Polarity Reference Channels: Microsoft Bug Check Code References
Today’s post continues an ongoing series on Polarity User Tips. Data tells a story, Polarity helps you see it with Augmented Reality overlaying contextual information as you work, giving you the right data at the right time to make informed decisions and take action with speed (no glasses or goggles required). This guide explains how […]
ThreatConnect Research Roundup: Suspected Naikon DGA Domains
May 28 2020 Edition Howdy, and welcome to the ThreatConnect Research Roundup, a collection of recent findings by our Research Team and items from open source publications that have resulted in Observations of related indicators across ThreatConnect’s CAL™ (Collective Analytics Layer). Note: Viewing the pages linked in this blog post requires a ThreatConnect account. Roundup […]
Strengthen Business and Security Alignment with ThreatConnect
ThreatConnect is changing the way security works and that means better alignment with, and transparency to, the business. ThreatConnect’s intelligence-driven, security operations solutions include both Threat Intelligence (TIP) and Security Orchestration, Automation and Response (SOAR) platforms. These solutions are designed to put intelligence at the core of every security decision, improve the way your security […]
ThreatConnect Research Roundup: Possible APT33 Infrastructure
May 21 2020 Edition Howdy, and welcome to the ThreatConnect Research Roundup, a collection of recent findings by our Research Team and items from open source publications that have resulted in Observations of related indicators across ThreatConnect’s CAL™ (Collective Analytics Layer). Note: Viewing the pages linked in this blog post requires a ThreatConnect account. Roundup […]
ThreatConnect and Jira: Automating Processes Made Easier
We’ve expanded our Jira integrations and now support more use cases with new ThreatConnect Apps. The existing ThreatConnect Playbook App for Jira Core has been improved and a brand new Playbook App that works with Jira Service Desk has been released. Users are now provided with more opportunities to coordinate activities between ThreatConnect and Jira […]
Polarity User Tips: The Ultimate Guide to Leveraging Color Theory for Instant Data Recognition
Today’s post continues an ongoing series on Polarity User Tips. Data tells a story, Polarity helps you see it with Augmented Reality overlaying contextual information as you work giving you the right data at the right time to make informed decisions and take action with speed. This guide explains how you can see the story in […]
ThreatConnect Research Roundup: Spoofing SharePoint
May 13 2020 Edition Howdy, and welcome to the ThreatConnect Research Roundup: Threat Intel Update (blog edition)! Here we will be sharing a collection recent findings by our Research Team, as well as items from open source publications that have resulted in observations of related indicators across ThreatConnect’s CAL™ (Collective Analytics Layer). Note: Viewing the […]
Access the MITRE ATT&CK Framework with Polarity Reference Channels
Today’s post continues an ongoing series on Polarity User Tips. Data tells a story, Polarity helps you see it with Augmented Reality overlaying contextual information as you work, giving you the right data at the right time to make informed decisions and take action with speed. This guide explains how you can see the story […]
ThreatConnect’s Developer Partner Program: We Meme Business
Integrations have always been at the heart of ThreatConnect’s product and company strategy. Never has that been more true than when we made the decision to move into the SOAR (security orchestration, automation, and response) market: integrations have become even more vital. A broad and open ecosystem of apps and integrations is crucial for the […]