Search results for:
-
May 19th, 2022
Tactical Threat Hunting – What Is It And How Do You Start?
Alert overload takes the security team’s attention away from many other essential aspects of keeping a healthy cyber ecosystem. Many teams cannot define and implement a threat hunting program becaus
-
May 17th, 2022
ThreatConnect RQ 6.3 – Making FAIR Even Easier
We’re excited to announce the release of ThreatConnect Risk Quantifier (RQ) version 6.3! This update is now available and provides a number of enhancements that make cyber risk quantification (CRQ)
-
May 13th, 2022
The 3 Key Elements of an Effective Cyber Threat Intelligence Program
There is often a conversational disconnect between a cybersecurity team and other departments of an organization. But as cyber is becoming an increasingly large part of business strategy, cybersecurit
-
May 5th, 2022
How To Select The Best SOAR Platform For Your Organization
Information overload is a common challenge facing Security Operations Centers (SOCs). Security analysts are bombarded with hundreds of alerts of potential security events. Sifting through and prioriti
-
May 1st, 2022
CISA
CISA is a component of the United States Department of Homeland Security (DHS) responsible for cybersecurity and infrastructure protection across all levels of government, coordinating cybersecurity p
-
Apr 27th, 2022
3 Strategies for Dealing With the Widening Cybersecurity Skills Gap
Many Security Operations Center (SOC) teams are under immense pressure! They’re facing many different challenges and while cybersecurity spending is increasing, investment isn’t always placed wher
-
Apr 26th, 2022
SecurityScorecard
SecurityScorecard is the global leader in cybersecurity ratings and the only service with over 12 million of organizations continuously rated. Thousands of organizations leverage our patented rating t
-
Apr 26th, 2022
The Power of Combining Outside-In and Inside-Out Cyber Risk Quantification
ThreatConnect is excited about the partnership with SecurityScorecard for their Cyber Risk Quantification (CRQ) solution powered by ThreatConnect Risk Quantifier (RQ). Applying ThreatConnect’s s
-
Apr 22nd, 2022
Why Build A Threat Library?
Cyber threat actors are using more sophisticated tools, techniques, and procedures that are outpacing traditional security solutions. As a result, things such as intrusion detection systems, anti-viru
-
Apr 22nd, 2022
4 Actions To Help Protect Your Organization From Malicious Russian Cyber Activity
The Russian invasion of Ukraine has escalated past traditional warfare. The impact and implications of the attack will be felt far past the region’s borders. The U.S. Government has recently issued
-
Apr 13th, 2022
The Importance of Assessing & Communicating the Financial Impact of Cyber Risks
Just as a captain would navigate their ship across vast oceans, it’s the responsibility of business leaders to determine the direction of the overall corporate strategy. To do this effectivel
-
Apr 12th, 2022
ThreatConnect Launches 6.5 Release to Enable Smarter Security Operations, Achieves SOC 2 Compliance
Latest release allows for threat intelligence and security operations analysts to more easily perform investigations and analysis in one unified platform