Search results for:
-
Sep 20th, 2022
Smarter Security and Maximum Impact from Intelligence-Powered Security Operations
Download our whitepaper to learn why operationalizing threat intelligence is critical to preparing teams to face the challenges of today and tomorrow.
-
Sep 20th, 2022
Threat Graph – Seeing is Believing
We all know the saying that, “a picture is worth a thousand words.” It is a fact that people derive meaning faster from imagery and graphics. At our core, humans are visual. Imagery can convey tho
-
Sep 15th, 2022
ThreatConnect For Threat Intel Analysts
As a cyber threat intel (CTI) analyst, you’re tasked with aggregating and analyzing multiple data sources to turn into actionable intelligence but getting high-fidelity intel in the hands of the rig
-
Sep 14th, 2022
Top Malware Strains Used by Threat Actors in 2021 – CISA Alert
Malware continues to grow in sophistication as record numbers of cyberattacks occur worldwide. Malware is often the tip of the spear for threat actors — first, they use it to compromise a computer o
-
Sep 13th, 2022
The Top Security Risks of Remote Working
The pandemic brought major changes to the way organizations work. The rapid adoption of work from anywhere (WFA), completely changed the enterprise cybersecurity landscape. A recent survey, led by I
-
Sep 8th, 2022
Black Hat USA 2022 Cybersecurity Conference Highlights
Black Hat USA, also known as Hacker Summer Camp, was held on August 10-11 at the Mandalay Bay Resort in Las Vegas, marking its 25th anniversary of the conference, and it was great to see everyone in p
-
Sep 8th, 2022
ThreatConnect For Security Leadership
The ThreatConnect Platform gives security leaders a single pane of glass to easily visualize data that shows the impact of your security teams’ efforts and gain a better understanding of the threats
-
Sep 7th, 2022
ThreatConnect For Incident Response
ThreatConnect for Incident Response drives quicker response times with native case management capabilities and relevant intelligence at your fingertips. Make your security teams and your security tool
-
Sep 1st, 2022
ThreatConnect For Security Operations
Security operations teams need to be efficient, responding to relevant threats fast, but without the right information and context about an alert, it’s difficult to know what to prioritize and h
-
Aug 26th, 2022
FBI FLASH on RagnarLocker Ransomware Expands Known Indicators of Compromise
The Federal Bureau of Investigation has recently released an updated FLASH Number CU-000163-MW as part of the overall Government efforts to identify and document ransomware threat actors and the multi
-
Aug 25th, 2022
ThreatConnect Risk Quantifier
Cyber Risk Quantification (CRQ) is a critical part of cybersecurity that will fundamentally change the way security works and how risk is communicated to business stakeholders. CRQ technology gives se
-
Aug 25th, 2022
5 Steps to Combat Phishing With Intelligence-Powered Security Operations
Did you know there were over 1 million phishing attacks just in Q1 of this year? 1,025,968, to be exact! Phishing attacks are getting more sophisticated and involve more clever ways to entice end user