Search results for:
-
Nov 3rd, 2016
Optiv
Optiv is the largest comprehensive pure-play cyber security solutions provider in North America. Our diverse and talented employees are committed to helping businesses, governments and educational ins
-
Nov 2nd, 2016
Step 1: Collect and Correlate Relevant Threat Data
How to Aggregate Relevant Threat Data Is your cybersecurity team small? Or, are you looking to make your team more efficient? It can be difficult to know where to start when you have limited resource
-
Oct 25th, 2016
What is a Cyber Threat? How to Explain Cyber Threats to Your CEO
How to explain cyber threats to your CEO and others. Learn more about the potential for risk. What is a cyber threat? To explain what a cyber threat is to your CEO, you have to remember what your CEO
-
Oct 24th, 2016
ThreatConnect and Symantec Collaborate to Provide Premium Threat Intelligence for Improved Threat Management
ThreatConnect Now Utilizes Symantec DeepSight Advanced IP and URL Reputation Feeds October 24 – Arlington, VA – ThreatConnect®, Inc., a provider of the leading intelligence-driven defense
-
Oct 11th, 2016
How to Manage and Integrate Signatures in ThreatConnect
Signature Management in ThreatConnect ThreatConnect API with SDKs enables users to develop tools that can automate signature generation and integrate signatures into existing security products When mo
-
Sep 22nd, 2016
ThreatConnect Adds RSA NetWitness Suite Integration to its Intelligence Platform
With ThreatConnect and RSA, Use Validated Threat Intelligence To Easily Spot Trends and Patterns September 22 – Arlington, VA – ThreatConnect®, Inc., provider of the leading intelligence-
-
Sep 19th, 2016
Guccifer 2.0 and The DNC Breach
We are very excited to share that ThreatConnect has been featured in multiple news articles about the recent hack of the Democratic National Committee. The Democrats think that the Russians hacked the
-
Sep 11th, 2016
Cyber Stratego: Strategic vs. Tactical Threat Intelligence
How You Can Apply Strategic and Tactical Threat Intelligence in ThreatConnect One of the questions we get from users of the ThreatConnect platform is, given an encountered indicator, “what shoul
-
Sep 2nd, 2016
Can a BEAR Fit Down a Rabbit Hole?
Can a BEAR Fit Down a Rabbit Hole? ThreatConnect Identifies Infrastructure Nexus Between Attacks Against State Election Boards and Spearphishing Campaign Against Turkish, Ukrainian Governments The qu
-
Aug 25th, 2016
Symantec by Broadcom
Symantec Enterprise Cloud delivers data-centric hybrid security for the largest, most complex organizations in the world – on devices, in private data centers, and in the cloud. We help companies, g
-
Aug 19th, 2016
RSA NetWitness
ThreatConnect is a software platform that unites your entire security team, your partners, and your industry peers together behind a cohesive, intelligence-driven defense. Working together in ThreatCo
-
Aug 12th, 2016
Does a BEAR Leak in the Woods?
Identifies DCLeaks As Another Russian-backed Influence Outlet Read the full series of ThreatConnect posts following the DNC Breach: “Rebooting Watergate: Tapping into the Democratic National Co