Read insights, thought leadership, and platform updates.
No Blogs Match Your Results
Please try again or contact marketing@threatconnect.com for more information on our blogs.
Achieve Faster, More Precise Vulnerability Prioritization with ThreatConnect and VulnCheck
In the rapidly evolving threat landscape, vulnerability management is a daunting task. Every month thousands of new vulnerabilities emerge, creating a significant challenge for threat intelligence and vulnerability management analysts. The new integration between ThreatConnect and VulnCheck promises to address these challenges by offering a unified, intelligent approach to accelerating identification and analysis, and improving […]
Enhancing Cybersecurity with CAL™ Automated Threat Library (ATL) Industry Classification
Enhancing Cybersecurity with CAL™ Automated Threat Library (ATL) Industry Classification. In the constantly changing field of cybersecurity, it is crucial to effectively manage and interpret large volumes of open-source intelligence (OSINT). ThreatConnect’s CAL™ Automated Threat Library (ATL) addresses this challenge by using natural language processing (NLP) to classify ATL Reports by industry using NAICS codes*. […]
The Benefits of Intelligence-Powered Cyber Defense with ThreatConnect and VMRay
In an era where cyber-attacks happen faster and are growing, staying ahead of adversaries is a necessity but very challenging. Quickly assessing suspected malicious files and URLs is vital for reducing the time it takes to detect and respond to cyber threats. Understanding the adversary’s tactics, techniques, and malware infrastructure can significantly improve your organization’s […]
Elevate Your Threat Detection and Response with ThreatConnect and Dataminr
Cybersecurity teams are under constant pressure to maintain real-time visibility into potential threats across various categories, including digital risks, third-party risks, vulnerabilities, and cyber-physical threats. The challenge lies in trying to monitor all these categories in real time for emerging and active threats. Monitoring, analyzing, and responding to cyber threats is resource-intensive and complex without […]
Evolve Your Cyber Risk Management with ThreatConnect Risk Quantifier 7.9
With the release of ThreatConnect RQ 7.9, organizations have access to new, powerful tools designed to improve cyber risk management. This release focuses on addressing common challenges in risk communication, enhancing technical risk analysis, and providing an improved user experience across RQ. The Challenge of Qualitative Risk Measures One longstanding challenge is effectively communicating qualitative […]
Why Polarity & ThreatConnect?
We announced today that ThreatConnect has acquired Polarity (you can read the press release here). Polarity’s solution augments security analysts’ daily workflow with context and insight needed for decision and action in their course of analysis regardless of the application they are in. We’re excited to have the Polarity team join the ThreatConnect family and […]
A New Integration With Elastic
In today’s digital world, the volume of cyber threats is growing at an alarming rate. Alerts often overwhelm analysts tasked with monitoring, detecting, analyzing, and responding to these threats. The newest integration between ThreatConnect’s TI Ops Platform and Elastic helps security operations teams and analysts get the upper hand on the threat actors targeting their […]
Elevate Your Threat Intel with CAL™ Feeds and AI-Powered Insights
CTI analysts often face the challenge of managing an overwhelming volume of diverse threat intelligence data, making it difficult to effectively aggregate, correlate, and act on this information. The brain of ThreatConnect’s TI Ops Platform, CAL™, addresses this issue by leveraging AI, natural language processing (NLP), and machine learning (ML) to deliver advanced analytics and […]
Stay Ahead of Threat Actors with ThreatConnect and Silent Push
We’re pleased to announce a new integration between ThreatConnect’s TI Ops Platform and Silent Push! The Challenge of Limited Visibility Analysts face a significant challenge – only about 2% of threat actor infrastructure is tracked. This leaves CTI and SecOps teams, which are already struggling to track, understand, and respond to threat actors effectively, with […]
ThreatConnect TI Ops Platform 7.6: Enhanced Report Creation and Threat Context
Analysts often deal with the inefficiencies of creating reports from scratch and navigating through scattered threat intel. In response to these challenges, ThreatConnect is excited to announce the latest enhancements for TI Ops Platform release 7.6. This update adds the capability to create more reporting templates and a streamlined way to view threat context, enabling […]
Recognizing the Limitations of FAIR
Story time. I recently had the opportunity to work with a large organization in the healthcare insurance industry. They wanted to adopt cyber risk quantification (CRQ) and really liked the FAIR model. The customer came to ThreatConnect and stated “we don’t need all the bells and whistles; we just want to be able to use […]
Understanding the SEC’s Recent Cybersecurity Regulations
In a recent webinar, Addressing the SEC Requirements for Materiality Disclosure, industry experts shed light on the intricate balance between cybersecurity management and the new regulatory requirements enforced by the Securities and Exchange Commission (SEC). They discussed the critical aspects of risk management, emphasizing the importance of quantifying cybersecurity risk and the role of executive […]