Skip to main content
Dataminr Redefines Cyber Defense with AI-Powered Client-Tailored Intelligence and Autonomous Threat and Exposure Management
Learn More
Request a Demo
ThreatConnect blog

Read insights, thought leadership, and platform updates.

Showing 633 posts
Sort

No Blogs Match Your Results

Please try again or contact marketing@threatconnect.com for more information on our blogs.

Threat Research

ThreatConnect Research Roundup: Possible APT33 Infrastructure

May 21 2020 Edition Howdy, and welcome to the ThreatConnect Research Roundup, a collection of recent findings by our Research Team and items from open source publications that have resulted in Observations of related indicators across ThreatConnect’s CAL™ (Collective Analytics Layer). Note: Viewing the pages linked in this blog post requires a ThreatConnect account. Roundup […]

ThreatConnect Platform

ThreatConnect and Jira: Automating Processes Made Easier

We’ve expanded our Jira integrations and now support more use cases with new ThreatConnect Apps. The existing ThreatConnect Playbook App for Jira Core has been improved and a brand new Playbook App that works with Jira Service Desk has been released. Users are now provided with more opportunities to coordinate activities between ThreatConnect and Jira […]

Polarity User Tips: The Ultimate Guide to Leveraging Color Theory for Instant Data Recognition
How-to Guides Polarity

Polarity User Tips: The Ultimate Guide to Leveraging Color Theory for Instant Data Recognition

Today’s post continues an ongoing series on Polarity User Tips. Data tells a story, Polarity helps you see it with Augmented Reality overlaying contextual information as you work giving you the right data at the right time to make informed decisions and take action with speed. This guide explains how you can see the story in […]

Threat Research

ThreatConnect Research Roundup: Spoofing SharePoint

May 13 2020 Edition Howdy, and welcome to the ThreatConnect Research Roundup: Threat Intel Update (blog edition)! Here we will be sharing a collection recent findings by our Research Team, as well as items from open source publications that have resulted in observations of related indicators across ThreatConnect’s CAL™ (Collective Analytics Layer). Note: Viewing the […]

Access the MITRE ATT&CK Framework with Polarity Reference Channels
How-to Guides Polarity

Access the MITRE ATT&CK Framework with Polarity Reference Channels

Today’s post continues an ongoing series on Polarity User Tips. Data tells a story, Polarity helps you see it with Augmented Reality overlaying contextual information as you work, giving you the right data at the right time to make informed decisions and take action with speed. This guide explains how you can see the story […]

Orchestration and Automation Partners

ThreatConnect’s Developer Partner Program: We Meme Business

Integrations have always been at the heart of ThreatConnect’s product and company strategy. Never has that been more true than when we made the decision to move into the SOAR (security orchestration, automation, and response) market: integrations have become even more vital. A broad and open ecosystem of apps and integrations is crucial for the […]

Security Operations

How to Improve Collaboration with Security Teams and Technology using ThreatConnect

ThreatConnect is an intelligence-led, SOAR Platform. We bring a critically important solution to market for our clients as we combine our world-class Threat Intelligence Platform with SOAR under one banner. This ensures that intelligence feeds operations and operations informs intelligence for future actions, continually improving the time to detect and respond to threats. In our […]

Polarity User Tips: Reference Channels
How-to Guides Polarity

Polarity User Tips: Reference Channels

Today’s post continues an ongoing series on Polarity User Tips. Data tells a story, Polarity helps you see it with Augmented Reality overlaying contextual information as you work, giving you the right data at the right time to make informed decisions and take action with speed. This guide explains how you can see the story […]

ThreatConnect Platform

Playbook Fridays: DomainTools Iris Investigate Monitor

Welcome to ThreatConnect’s Playbook Fridays! We will continually publish posts featuring Playbooks (and sometimes Dashboards!) that can be built in the Platform. ThreatConnect developed the Playbooks capability to help analysts automate time consuming and repetitive tasks so they can focus on what is most important. And in many cases, to ensure the analysis process can […]

Security Operations

Improving Accuracy and Efficiency in Security Operations with ThreatConnect

ThreatConnect is the central nervous system for your entire security ecosystem. Our intelligence-driven Security Orchestration Automation and Response (SOAR) Platform is a place for your security team to work smarter, together. As a company, we are driving the evolution of security operations by delivering enriched, fortified, context-filled threat intelligence along with comprehensive analytics, seamless automation […]

How Polarity can help Data Loss Prevention
Polarity

How Polarity can help Data Loss Prevention

Today’s post continues an ongoing series on Polarity Use Cases. With a solution that overlays on any screen you’re looking at, Polarity has as many use cases as you do tasks in your workflow. Using Polarity, you’ll be armed with data awareness and recall so you can make better decisions, faster. This example showcases our […]

SOAR Higher with Polarity
Polarity

SOAR Higher with Polarity

Security Operations Automation & Response (SOAR) platforms are now widely deployed as a way to address an ever-increasing volume of attacks. From automating the response to phishing emails to more sophisticated playbooks, SOAR platforms are producing positive results. Still, security teams recognize that not everything can be automated, and even what can be addressed with […]

Browse More Resources