Skip to main content
Dataminr Redefines Cyber Defense with AI-Powered Client-Tailored Intelligence and Autonomous Threat and Exposure Management
Learn More
Request a Demo
ThreatConnect blog

Read insights, thought leadership, and platform updates.

Showing 633 posts
Sort

No Blogs Match Your Results

Please try again or contact marketing@threatconnect.com for more information on our blogs.

Threat Research

Threat Intelligence in 3rd Party Risk Assessment

We’ve finally arrived at the fourth and final installment in this series exploring the relationship between threat intelligence and risk management. If you’re just joining us, previous posts are listed at the bottom of the page (and I do encourage you to start with those before diving into this one). We’ve covered a fair amount […]

Incident Response ThreatConnect Platform

Best Practices: Indicator Rating and Confidence

ThreatConnect enables users to assign a Threat Rating and Confidence to every single indicator… but what do those numbers really represent?  In order to enable your organization to make the best decisions, it’s important to standardize on the connotation attached to these ratings.  When your analysts, defensive integrations, and leadership all speak the same language […]

Threat Research

Threat Intelligence-Driven Risk Analysis

Way, way too long ago, we started a series exploring the relationship between threat intelligence and risk management. I’m not sure if a 3+ month gap disqualifies it as a series, but I’ll claim we’re taking a page from the George R.R. Martin school of sequel timing. To refresh your memory, the last post examined how threat intelligence fits within […]

Threat Research

5 Tips For Effective Threat Intelligence

5 Tips For Effective Threat Intelligence See the FULL story 1.  Develop a strategy. 2. Choose your threat intelligence platform. 3. Find and hire the right people. (It’s not easy.) 4. Automate. Automate. Automate. 5. Gain better oversight via threat intelligence.

Threat Research

What’s in a Platform?

The following post will examine the need for organizations to use a Platform to meet the organization’s ever changing security requirements.  Unfortunately, the term Platform is an overused term, so we will look at what makes a true platform – what some call a Level 3 Platform. Then, we’ll examine how a true threat intelligence […]

Competitive Differentiation Partners

Why Build Apps in ThreatConnect

Why Build Apps and Share them in ThreatConnect’s TC Exchange™ – Collaborate to Strengthen Your Threat Intelligence Practice If you’ve spoken with anyone here at ThreatConnect, you may have noticed that we, and many of our customers are all pretty excited about the launch of ThreatConnect’s TC Exchange™. I thought it would be a good […]

Competitive Differentiation ThreatConnect Platform

ThreatConnect and Maltego

ThreatConnect® has partnered with Malformity Labs LLC to develop a full transform set that allows for data from ThreatConnect to be integrated with the capabilities of Maltego. All ThreatConnect customers can take advantage of our partnership with Malformity Labs LLC and use the Maltego transform set through the ThreatConnect®  API and a provided transform server. Customers […]

Threat Intelligence Operations

Threat Intelligence within the Risk Management Process

How Threat Intelligence fits within Risk Management This is the second post in a series exploring the relationship of threat intelligence and risk management. If you missed the previous one, wherein I briefly explained why these two should get together, read that first. If you’re wondering what qualifies me to pontificate about managing risk, don’t worry; it’s on my […]

Threat Research

China Hacks the Peace Palace: All Your EEZ’s Are Belong to Us

Executive Summary In early July 2015, Chinese APT actors used an Adobe Flash Player exploit within a specific webpage detailing a noteworthy international legal case between the Philippines and China. This precedent setting legal case would be followed by many Southeast Asian nations, as well as others around the globe. The exploit appeared on day […]

Threat Intelligence Operations

Threat Intelligence and Risk Management

Introduction to Threat Intelligence and Risk Management Several of us at ThreatConnect attended the Gartner Security & Risk Management Summit last week, which, conveniently took place right across the river from our home offices. I’m not sure if it’s the Summit, the summer, or something else, but I’ve been thinking quite a lot lately about […]

Threat Research

OPM Breach Analysis: Update

As highlighted in our recent webinar with Rick Holland, when there is a security event of great magnitude, organizational leadership will want to know as much as possible about the technical WHAT and HOW, as well as the WHO and the WHEN. In many cases, not all of these questions can be answered definitively; however, […]

Threat Research

OPM Breach Analysis

Back in February 2015, the ThreatConnect team conducted in-depth independent analysis of the Anthem breach, finding connections to amorphous Chinese APT activity. Although our primary concern at the time was with the malicious Wellpoint/Anthem and VAE, Inc. (a Federal contractor) command and control domains, we couldn’t help but notice a peculiar related OPM-themed domain, opm-learning[.]org. […]

Browse More Resources