- 
                            
                                Jun 11th, 2021
                                Detect and Contain Cyberattacks Faster With Intelligence-Driven SOARWhen it comes to containing cyberattacks and limiting their ability to cause harm within your environment, time is money. On average, a company able to detect and contain a breach in less than 200 day 
- 
                            
                                May 20th, 2021
                                Improve SOC Event Prioritization With Intelligence-Driven SOARInformation overload is a common challenge facing Security Operations Centers (SOCs). Security analysts are bombarded with alerts of potential security events. Sifting through and prioritizing the mos 
- 
                            
                                Feb 18th, 2021
                                SolarWinds Hack Spurs Interest In Risk-Based Threat HuntingThe SolarWinds hack of the software supply chain, which is considered the most significant and far-reaching cyber espionage operation targeting the U.S. government to date, has elevated the government 
- 
                            
                                Jan 25th, 2021
                                TIP & SOAR: Creating Increased Capability For Less Mature TeamsBuilding a threat intelligence-led security program with security orchestration, automation, and response (SOAR) capabilities helps to advance your program and gives your company or agency a fighting 
- 
                            
                                Jan 6th, 2021
                                Risk Quantification, Threat Intelligence & Automation: Stronger TogetherThreatConnect's marries cyber risk quantification (CRQ), threat intelligence platform (TIP), and SOAR capabilities. 
- 
                            
                                Dec 21st, 2020
                                Why Your SOAR Needs Threat Intel Management, Not Feed ManagementWhen it comes to using threat intelligence to aid in the investigation of alerts or phishing, it’s essential to have the right feeds (whether OSINT or paid). We often get asked, “can I just dump f