Search results for:
-
Feb 21st, 2019
Using Visualization to Make Threat Intelligence Actionable
Follow along with Dan Cole, Director of Product Management, and Drew Gidwani, Director of Analytics, as they discuss how to use visualization to make threat intelligence actionable. Tune into this web
-
Feb 21st, 2019
Playbook Fridays: QRadar Tag Search
Ground truth is one of the most important sources informing threat intelligence. A key source of this truth is what’s happening in the SIEM- QRadar in this case. Knowing this, we needed a way to cor
-
Feb 21st, 2019
The Diamond Model: An Analyst’s Best Friend
During this video, 2 of the 3 co-authors of the Diamond Model for Intrusion Analysis, Sergio Caltagirone from Dragos and Andy Pendergast from ThreatConnect, talk about how to properly utilize the Diam
-
Feb 21st, 2019
Four Things You Might Not Be Doing in ThreatConnect, But Should Be
Watch this webinar to learn about the top four things that we don’t always see customers doing, but that we think could be super helpful. They are also the four things that we get the most questions
-
Feb 21st, 2019
Identify, Manage, and Block Threats Faster: Webinar with ESG Lab
ESG Lab evaluated the ThreatConnect threat intelligence, analytics, and orchestration platform, TC Complete, and two components of the platform, TC Analyze and TC Identify. Their goal was to validate
-
Feb 21st, 2019
Collecting and Analyzing Intelligence About Potential Threats
Hear ThreatConnect’s Senior Threat Intelligence Researcher, Alex Valdivia, speak on a panel of experts on how to uncover the motivation and mitigation methods for threat actors targeting your organi
-
Feb 21st, 2019
ThreatConnect’s Revamped Search Functionality
Find what you’re looking for quickly; even if you don’t find what you’re looking for, our new Search will point you in the right direction. Indicators, Groups, and Tags now all feature a “Grap
-
Feb 21st, 2019
Playbooks ROI Calculator – How to Save Time and Money
Overview of our Playbooks ROI calculator, and how to display ROI in terms of time and money saved.
-
Feb 21st, 2019
Exploiting the Adversary How to the Proactive with Threat Intelligence
Understanding your adversary is essential to effective cybersecurity. In order to block threat actors, now and in the future, you must know where they have been before, what their techniques, tactics,
-
Feb 21st, 2019
Getting Started with Threat Intelligence
Just warming up to threat intelligence? Not sure where to start? Security professionals need to quickly identify real threats to their organization, even if they don’t have the budget to build out a
-
Feb 21st, 2019
TQL & Dashboards: Better Insight into Your Threat Intelligence Operations
ThreatConnect’s new dashboards allow you to easily visualize data that shows the impact of your security efforts and gain a better understanding of the threats your organization faces. Join us for a
-
Feb 21st, 2019
Setting Up the ThreatConnect TAXII Server User
The ThreatConnect® TAXII™ server can be used by an external TAXII client to retrieve data from a ThreatConnect user’s Organization and any Communities or Sources to which the user has access. To