Posts
-
Jun 8th, 2023
Applying the Diamond Model for Threat Intelligence to the Star Wars’ Battle of Yavin
Alternate titles: “Diamonds are a Sith’s best friend” “I used to Bullseye Womp Rats in my t-shirt back home.” “That’s no Shamoon…it’s a space stat
-
Jul 23rd, 2021
ThreatConnect and Amazon S3 and EC2: Better Manage Cloud Infrastructure
ThreatConnect has built new integrations to work with Amazon’s cloud infrastructure. With these integrations, you can more easily monitor and protect your AWS environment. Amazon Simple Storage Se
-
Jun 16th, 2021
GreyNoise and ThreatConnect: Protect against Noisy IPs
ThreatConnect has released a new GreyNoise Playbook App. GreyNoise helps analysts quickly understand which alerts don’t matter by providing context on noisy IP addresses across the internet. With th
-
Aug 6th, 2020
Research Roundup: Recent Probable Charming Kitten Infrastructure
Howdy, and welcome to the ThreatConnect Research Roundup, a collection of recent findings by our Research Team and items from open source publications that have resulted in Observations of related ind
-
May 7th, 2020
How to Improve Collaboration with Security Teams and Technology using ThreatConnect
ThreatConnect is an intelligence-led, SOAR Platform. We bring a critically important solution to market for our clients as we combine our world-class Threat Intelligence Platform with SOAR under one b
-
Apr 30th, 2020
Improving Accuracy and Efficiency in Security Operations with ThreatConnect
ThreatConnect is the central nervous system for your entire security ecosystem. Our intelligence-driven Security Orchestration Automation and Response (SOAR) Platform is a place for your security team
-
Jun 29th, 2015
Threat Intelligence within the Risk Management Process
How Threat Intelligence fits within Risk Management This is the second post in a series exploring the relationship of threat intelligence and risk management. If you missed the previous one, wherein
-
Jun 19th, 2015
Threat Intelligence and Risk Management
Introduction to Threat Intelligence and Risk Management Several of us at ThreatConnect attended the Gartner Security & Risk Management Summit last week, which, conveniently took place right across
-
Feb 27th, 2015
The Anthem Hack: All Roads Lead to China
When news of the Anthem breach was reported on February 4th, 2015, the security industry quite understandably went wild. A breach of this magnitude was certainly unprecedented. Naturally, many indus
-
Feb 15th, 2015
ThreatConnect How To: Pivoting & Exporting Data
Introduction The Diamond Model of Intrusion Analysis is the analytic methodology upon which ThreatConnect is built. Developed by a number of preeminent security researchers and analysts (including o