Skip to main content
Dataminr Redefines Cyber Defense with AI-Powered Client-Tailored Intelligence and Autonomous Threat and Exposure Management
Learn More
Request a Demo
ThreatConnect blog

Read insights, thought leadership, and platform updates.

Showing 633 posts
Sort

No Blogs Match Your Results

Please try again or contact marketing@threatconnect.com for more information on our blogs.

ThreatConnect Platform

7 Threat Intelligence Tools Your Team Needs

In today’s world cyber criminals are working hard to constantly come up with new tools, techniques, and procedures to infiltrate networks, socially engineer users and employees, steal money or information, and assault various targets. As the bad guys’ methods expand, the security industry has responded to these evolving threats. There are hundreds of tools, services, […]

Threat Research

How Companies Use ThreatConnect to Make Their Cybersecurity Programs More Efficient: A Use Case

Make Your Cybersecurity Program More Efficient Using ThreatConnect This is the second in a series of blog posts about how organizations are utilizing the ThreatConnect platform. We’re sharing stories of how customers are transforming their security programs using ThreatConnect. How do I make my cybersecurity program more efficient? It’s a valid question that many organizations […]

Orchestration and Automation ThreatConnect Platform

How Companies Use ThreatConnect When Building Their Cybersecurity Program: A Use Case

Build Your Cybersecurity Program Using ThreatConnect This is the first in a series of blog posts about how organizations are utilizing the ThreatConnect platform. We’ll share stories of how customers just like you have transformed their security programs using ThreatConnect. Introducing Gringotts A Fortune 1000 Financial Services company, who we will call Gringotts, has a […]

Threat Research

Step 1: Collect and Correlate Relevant Threat Data

How to Aggregate Relevant Threat Data Is your cybersecurity team small? Or, are you looking to make your team more efficient? It can be difficult to know where to start when you have limited resources. Today we begin a six-blog series that will cover how to make the most of your cybersecurity program when you have […]

Threat Research

What is a Cyber Threat? How to Explain Cyber Threats to Your CEO

How to explain cyber threats to your CEO and others. Learn more about the potential for risk. What is a cyber threat? To explain what a cyber threat is to your CEO, you have to remember what your CEO cares about most: shareholders, revenue and profit, brand equity, company data – and speak in analogies […]

ThreatConnect Platform

How to Manage and Integrate Signatures in ThreatConnect

Signature Management in ThreatConnect ThreatConnect API with SDKs enables users to develop tools that can automate signature generation and integrate signatures into existing security products When most people first see the ThreatConnect security platform, they may be introduced to the Signatures feature that allows analysts and users to store multiple types of signatures. However, the […]

Threat Intelligence Operations Threat Intelligence Platform

Cyber Stratego: Strategic vs. Tactical Threat Intelligence

How You Can Apply Strategic and Tactical Threat Intelligence in ThreatConnect One of the questions we get from users of the ThreatConnect platform is, given an encountered indicator, “what should we look for in the platform?” Of course, as with most things intelligence-related, the answer is “it depends.” It depends on your organization’s sources and […]

Threat Research ThreatConnect Insights

Can a BEAR Fit Down a Rabbit Hole?

Can a BEAR Fit Down a Rabbit Hole? ThreatConnect Identifies Infrastructure Nexus Between Attacks Against State Election Boards and Spearphishing Campaign Against Turkish, Ukrainian Governments The question on everyone’s mind: Who is behind the recently reported compromises of Arizona and Illinois’ state board of elections (SBOE)? The answer is, we don’t know. When we reviewed FBI […]

ThreatConnect Insights

Does a BEAR Leak in the Woods?

Identifies DCLeaks As Another Russian-backed Influence Outlet Read the full series of ThreatConnect posts following the DNC Breach: “Rebooting Watergate: Tapping into the Democratic National Committee“, “Shiny Object? Guccifer 2.0 and the DNC Breach“, “What’s in a Name Server?“, “Guccifer 2.0: the Man, the Myth, the Legend?“, “Guccifer 2.0: All Roads Lead to Russia“, “FANCY BEAR […]

Threat Research

FANCY BEAR Has an (IT) Itch that They Can’t Scratch

*This post can also be found on the Fidelis blog, ThreatGeek.*             FANCY BEAR Has an (IT) Itch that They Can’t Scratch ThreatConnect and Fidelis team up to explore the Democratic Congressional Campaign Committee (DCCC) compromise Following news reports that the Democratic Congressional Campaign Committee (DCCC) was breached via a spoofed donation website, […]

Threat Research

Guccifer 2.0: All Roads Lead to Russia

Guccifer 2.0: All Roads Lead to Russia Update 07/26/2016  4:00pm EDT Joe Uchill with The Hill, who has previously covered Guccifer 2.0 and the Wikileaks DNC data dump, has provided us with redacted information on his communications with Guccifer 2.0 that has raised our confidence in our current assessments and hypotheses. Check out Joe’s story […]

Threat Research

Guccifer 2.0: the Man, the Myth, the Legend?

Guccifer 2.0: the Man, the Myth, the Legend? ThreatConnect reassesses Guccifer 2.0’s claims in light of his recent public statements Read the full series of ThreatConnect posts following the DNC Breach: “Rebooting Watergate: Tapping into the Democratic National Committee“, “Shiny Object? Guccifer 2.0 and the DNC Breach“, “What’s in a Name Server?“, “Guccifer 2.0: the Man, […]

Browse More Resources