Search results for:
-
Mar 30th, 2022
GreyNoise
GreyNoise is a cybersecurity company that filters Internet background noise. It collects, analyzes, and labels mass internet scan and attack activity into a feed of Anti-Threat Intelligence. This cont
-
Mar 30th, 2022
Flare
Flare provides a proactive digital footprint monitoring solution for organizations. The Flare platform automates your dark, deep and clear web monitoring, providing you with real-time actionable intel
-
Mar 30th, 2022
Devo
Devo is a cybersecurity company that provides cloud-native logging and security analytics for organizations. The Devo Platform enables information security and operations teams to address common use c
-
Mar 30th, 2022
Censys
Censys is a cybersecurity company that offers Internet-wide continuous visibility and real-time risk assessment. Censys provides data-driven security used by researchers, corporations, and governments
-
Mar 30th, 2022
Bambenek Consulting
Bambenek Consulting is a cybersecurity investigations and intelligence consulting firm focusing on tackling major criminal threats. Services include the Well Fed Intelligence feeds used by thousands o
-
Mar 23rd, 2022
Peaky Blinders: Combat Ransomware Gangs with High Fidelity Intelligence-Driven Operations
The plague of ransomware continues to grow in 2022 with attacks raging through industries and affecting structures such as oil pipelines, payroll systems, and managed service provider software. Many r
-
Mar 23rd, 2022
Enabling Analysts: Intelligence-Driven CVE Enrichment & Remediation
Security analysts need the ability to filter out the noise and focus on what matters most – particularly when it comes to vulnerability management. By using threat intelligence to enrich respons
-
Mar 22nd, 2022
How to SOAR with Risk Based Vulnerability Management
Risk-based vulnerability management (RBVM) is an ideal use case to operationalize and automate within SOAR as it needs to connect threat intelligence, data collection, enrichment, cross-team workflows
-
Mar 18th, 2022
Every Type of SOC Needs a SOAR
Many organizations have a Security Operations Center (SOC). It may not be one that has a large room full of analysts, engineers, threat hunters, and incident responders, with a wall of monitors
-
Mar 11th, 2022
To Code Or Not To Code
To code or not to code? That is the question that many security teams grapple with when attempting to solve a specific problem or introduce a new capability. While TIP and SOAR platforms like Threat
-
Mar 7th, 2022
How to: Dashboards for Ukraine Conflict Threat Intelligence
The ThreatConnect Platform is optimized for providing organizations the ability to create a custom dashboard for pulling together real-time, topical threat intelligence into a single view. The curre
-
Feb 11th, 2022
Key Functionalities of a Modern CTI Program
Everyone knows security is overloaded work wise – not everyone understands what that means. Cyber Threat Intelligence (CTI) is typically very technical so how can you convince the teams setting busi