Skip to main content
Dataminr Redefines Cyber Defense with AI-Powered Client-Tailored Intelligence and Autonomous Threat and Exposure Management
Learn More
Request a Demo
ThreatConnect blog

Read insights, thought leadership, and platform updates.

Showing 510 posts
Sort

No Blogs Match Your Results

Please try again or contact marketing@threatconnect.com for more information on our blogs.

ThreatConnect’s 2024 Year in Review: Let’s Celebrate What We’ve Accomplished Together
Thought Leadership ThreatConnect Platform

ThreatConnect’s 2024 Year in Review: Let’s Celebrate What We’ve Accomplished Together

With 2024 in our rearview mirror, let’s take a moment to reflect. Like always, threats are evolving, and security challenges are becoming… more challenging: escalations in targeted ransomware attacks, emerging techniques like adversary-in-the-middle phishing, and a stream of vendors throw all of their offerings into the mix that now need to be integrated into your […]

Threat Intelligence Platform

Navigate ISO 27001:2022 Compliance with ThreatConnect

ISO 27001 has long set the standard for managing information security. Still, the 2022 updates bring a critical shift: organizations must now effectively process and analyze threat intelligence to stay ahead of increasingly sophisticated threats. These updates go beyond compliance, challenging organizations to integrate actionable intelligence and streamline security operations. For many, this introduces new […]

Unlocking the Potential of Cyber Threat Intelligence: A Guide to the Threat Intelligence Maturity Model
Threat Intelligence Operations

Unlocking the Potential of Cyber Threat Intelligence: A Guide to the Threat Intelligence Maturity Model

A rapidly evolving cyber threat landscape demands that organizations adopt more than reactive defenses—they need proactive, intelligence-driven strategies. The Threat Intelligence Maturity Model (TIMM) serves as a roadmap for organizations to assess, plan, and advance their cyber threat intelligence (CTI) capabilities, regardless of their journey. The Five Levels of Threat Intelligence Maturity The TIMM provides […]

Solving Complex Threats with Microsoft Copilot Integration for ThreatConnect
Partners

Solving Complex Threats with Microsoft Copilot Integration for ThreatConnect

Security teams face constant pressure to sift through vast data to identify threats, assess risks, and respond promptly. Imagine a scenario where a Cyber Threat Intelligence (CTI) team is investigating a sophisticated phishing campaign targeting their organization. Clues are minimal, and time is critical. This is where the Microsoft Copilot for Security integration with ThreatConnect […]

Five Quick Tips to Enhance Your Threat Hunting Program
How-to Guides ThreatConnect Platform

Five Quick Tips to Enhance Your Threat Hunting Program

As a CTI analyst, you know that advanced threats often evade traditional security tools, leaving gaps that can put your organization at risk. Whether starting from scratch or seeking to elevate your current threat-hunting program, the challenge is real: you need to hunt for these hidden threats proactively, but building a structured, effective program takes […]

ThreatConnect CAL™: New, Unique Intelligence for Polarity
Collective Analytics Layer (CAL) Polarity

ThreatConnect CAL™: New, Unique Intelligence for Polarity

In the current cybersecurity environment, organizations face a barrage of alerts concerning suspicious activities that can quickly overwhelm their security teams. CTI Analysts must navigate this complexity while ensuring they can accurately identify genuine threats amidst false positives. This challenge is especially pronounced in industries where the stakes are high and the need for precision […]

ThreatConnect TI Ops Platform 7.7: Boost Your Security Team’s Efficiency
Threat Intelligence Operations ThreatConnect Platform

ThreatConnect TI Ops Platform 7.7: Boost Your Security Team’s Efficiency

Security teams face constant challenges in managing vast amounts of threat data and quickly identifying what matters most. ThreatConnect’s TI Ops 7.7 release addresses these needs with new features like Enhanced Search and Clear Context, designed to streamline threat detection and analysis. By enhancing search precision and consolidating critical information, these updates help teams work […]

Top 5 Best Practices to Continuously Improve Your Intelligence Requirements
Threat Intelligence Operations ThreatConnect Platform

Top 5 Best Practices to Continuously Improve Your Intelligence Requirements

Organizations must adopt a practice of continuous improvement to maintain relevant and agile intelligence requirements, which are crucial in today’s rapidly evolving cyber threat landscape. Here are the top five best practices for refining and updating your intelligence requirements to stay ahead of evolving threats. 1. Regularly Monitor and Assess the Threat Landscape and Adjust […]

Enhancing Cybersecurity with CAL™ Automated Threat Library (ATL) Industry Classification
Collective Analytics Layer (CAL) Threat Intelligence Operations

Enhancing Cybersecurity with CAL™ Automated Threat Library (ATL) Industry Classification

Enhancing Cybersecurity with CAL™ Automated Threat Library (ATL) Industry Classification. In the constantly changing field of cybersecurity, it is crucial to effectively manage and interpret large volumes of open-source intelligence (OSINT). ThreatConnect’s CAL™ Automated Threat Library (ATL) addresses this challenge by using natural language processing (NLP) to classify ATL Reports by industry using NAICS codes*. […]

The Benefits of Intelligence-Powered Cyber Defense with ThreatConnect and VMRay
Partners ThreatConnect Platform

The Benefits of Intelligence-Powered Cyber Defense with ThreatConnect and VMRay

In an era where cyber-attacks happen faster and are growing, staying ahead of adversaries is a necessity but very challenging. Quickly assessing suspected malicious files and URLs is vital for reducing the time it takes to detect and respond to cyber threats. Understanding the adversary’s tactics, techniques, and malware infrastructure can significantly improve your organization’s […]

Elevate Your Threat Detection and Response with ThreatConnect and Dataminr
Incident Response Partners

Elevate Your Threat Detection and Response with ThreatConnect and Dataminr

Cybersecurity teams are under constant pressure to maintain real-time visibility into potential threats across various categories, including digital risks, third-party risks, vulnerabilities, and cyber-physical threats. The challenge lies in trying to monitor all these categories in real time for emerging and active threats. Monitoring, analyzing, and responding to cyber threats is resource-intensive and complex without […]

Evolve Your Cyber Risk Management with ThreatConnect Risk Quantifier 7.9
Cyber Risk Quantification ThreatConnect Risk Quantifier

Evolve Your Cyber Risk Management with ThreatConnect Risk Quantifier 7.9

With the release of ThreatConnect RQ 7.9, organizations have access to new, powerful tools designed to improve cyber risk management. This release focuses on addressing common challenges in risk communication, enhancing technical risk analysis, and providing an improved user experience across RQ. The Challenge of Qualitative Risk Measures One longstanding challenge is effectively communicating qualitative […]

Browse More Resources