Read insights, thought leadership, and platform updates.
No Blogs Match Your Results
Please try again or contact marketing@threatconnect.com for more information on our blogs.
Creating Order from Chaos: Enabling (Even) Better Decision Making with ThreatConnect 6.0
For those that don’t know, I have 4 kids and a dog. The children are 9 and under. Fresno, my dog, is like 100 years old in “dog years.” My house is chaotic, to say the least. I remember being able to sit down at my desk in the morning with a cup of coffee […]
Expose Data Breaches with Actionable Intelligence using the Polarity-Cyber Risk Analytics Integration
Today’s post continues an ongoing series on Polarity Integrations. With over 100 powerful integrations, the Polarity Integrations Library allows users to connect Polarity to the tools they already use in their workflow, arming them with even better data awareness and recall. This example showcases our integration with Cyber Risk Analytics. Data breaches are occurring within companies […]
How is Tool Fatigue Adding Complexity to Your Workflow?
Remote teams – especially remote teams in cybersecurity – rely on tools to get the job done in every step of their to-do lists. There are so many tools out there to choose from that we evaluated and compiled The Best Tools to Keep your Remote Security Team on the Same Page. In fact, there are […]
Playbook Fridays: Potential Zoom-related Threats Dashboard
This Dashboard was created to track potential Zoom-related intelligence and indicators as the news of it being vulnerable was widely publicized. With many of us working from home these days, and in general more people being at home – attackers know this and know they have a much larger number of Zoom users to exploit. […]
Turning Cobalt Into Diamonds: Building an Actor Profile For Hunting
Summary Hunting adversaries begins with understanding their behavior through data. In this blog post, we’ll use the Diamond Model as a vehicle to create an actor profile for the criminal group Cobalt Gang. We’ll start by reviewing what is known about the adversary, orienting ourselves to their typical operations, and extracting data from their identified […]
Do You See the Story Your Data is Telling?
I’ve been in security for nearly 20 years now, and my fascination for our industry is no less than when I started. The tech industry moves fast, and security moves even faster. This rapid pace and the innovation that drives it is a big part of what makes security exciting. In my time as a […]
Now Available: CAL COVID19-themed Newly Registered Domains Feed
As the world is struggling to respond to the global COVID-19 pandemic, we want to make sure we’re doing our part. There are a number of ne’er-do-wells that are trying to take advantage of the situation by exploiting people in their time of need, and we applaud the industry for coming together to find ways […]
What Comes After Data-to-Everything?
A good hockey player skates to where the puck is. A great hockey player skates to where the puck is going to be. – Wayne Gretzky It might be cliche, but I’m an avid hockey player and coach. I’ve got as much of a right as anyone to quote the great one. I’ve spent the […]
How to Build a Basic Workflow in ThreatConnect
From a Simple Notification Email to Threat-Bending Phishing Triage, This Is Your First Step ThreatConnect 6.0 introduces a brand new feature: Workflow. This capability lets you combine manual and automated operations to define consistent and standardized processes for your security teams: Malware analysis Phishing triage Alert triage Intel requirement development Escalation procedures Breach SOP And […]
Polarity User Tips: Single Monitor Setup
Today’s post continues an ongoing series on Polarity User Tips. We help our users make better decisions, faster, with augmented reality for your desktop. This guide explains how users can get the most out of Polarity via Single or Dual Monitor Setups. Unfortunately, cybercrime won’t stop because of the ongoing COVID-19 pandemic. These are critical […]
Detect Phishing Attempts Instantaneously with the Polarity-EmailRep Integration
Today’s post continues an ongoing series on Polarity Integrations. With over 100 powerful integrations, the Polarity Integrations Library allows users to connect Polarity to the tools they already use in their workflow, arming them with even better data awareness and recall. This example showcases our integration with EmailRep. Phishing campaigns are still one of the most […]
The Best Tools to Keep your Remote Security Team on the Same Page
Here at Polarity, we’re a remote-first team, meaning our culture and infrastructure is built around remote work – it’s part of our identity as an organization. If you’re now working from home for an organization that typically works in an office, you’ll find yourself less prepared for the “new normal” of remote life that we’re collectively […]