Search results for:
-
Apr 15th, 2020
Creating Order from Chaos: Enabling (Even) Better Decision Making with ThreatConnect 6.0
For those that don’t know, I have 4 kids and a dog. The children are 9 and under. Fresno, my dog, is like 100 years old in “dog years.” My house is chaotic, to say the least. I remember being ab
-
Apr 15th, 2020
Expose Data Breaches with Actionable Intelligence using the Polarity-Cyber Risk Analytics Integration
Today’s post continues an ongoing series on Polarity Integrations. With over 100 powerful integrations, the Polarity Integrations Library allows users to connect Polarity to the tools they already u
-
Apr 15th, 2020
How is Tool Fatigue Adding Complexity to Your Workflow?
Remote teams – especially remote teams in cybersecurity – rely on tools to get the job done in every step of their to-do lists. There are so many tools out there to choose from that we eva
-
Apr 10th, 2020
Playbook Fridays: Potential Zoom-related Threats Dashboard
This Dashboard was created to track potential Zoom-related intelligence and indicators as the news of it being vulnerable was widely publicized. With many of us working from home these days, and in ge
-
Apr 9th, 2020
Turning Cobalt Into Diamonds: Building an Actor Profile For Hunting
Summary Hunting adversaries begins with understanding their behavior through data. In this blog post, we’ll use the Diamond Model as a vehicle to create an actor profile for the criminal group Cobal
-
Apr 8th, 2020
Do You See the Story Your Data is Telling?
I’ve been in security for nearly 20 years now, and my fascination for our industry is no less than when I started. The tech industry moves fast, and security moves even faster. This rapid pace and t
-
Apr 6th, 2020
Now Available: CAL COVID19-themed Newly Registered Domains Feed
As the world is struggling to respond to the global COVID-19 pandemic, we want to make sure we’re doing our part. There are a number of ne’er-do-wells that are trying to take advantage of the situ
-
Apr 6th, 2020
What Comes After Data-to-Everything?
A good hockey player skates to where the puck is. A great hockey player skates to where the puck is going to be. – Wayne Gretzky It might be cliche, but I’m an avid hockey player and coach. I
-
Apr 2nd, 2020
How to Build a Basic Workflow in ThreatConnect
From a Simple Notification Email to Threat-Bending Phishing Triage, This Is Your First Step ThreatConnect 6.0 introduces a brand new feature: Workflow. This capability lets you combine manual and auto
-
Apr 1st, 2020
Polarity User Tips: Single Monitor Setup
Today’s post continues an ongoing series on Polarity User Tips. We help our users make better decisions, faster, with augmented reality for your desktop. This guide explains how users can get the mo
-
Mar 30th, 2020
Detect Phishing Attempts Instantaneously with the Polarity-EmailRep Integration
Today’s post continues an ongoing series on Polarity Integrations. With over 100 powerful integrations, the Polarity Integrations Library allows users to connect Polarity to the tools they already u
-
Mar 27th, 2020
The Best Tools to Keep your Remote Security Team on the Same Page
Here at Polarity, we’re a remote-first team, meaning our culture and infrastructure is built around remote work – it’s part of our identity as an organization. If you’re now working from