Search results for:
-
Aug 22nd, 2022
The ThreatConnect TI Ops Platform
The ThreatConnect TI Ops Platform, built on an industry-leading threat intelligence platform, enables security teams to confidently forge their path to smarter security with intel-powered security ope
-
Aug 22nd, 2022
Put Threat Intelligence at the Core of your Security Operations
Threat intelligence teams have a problem, a big data problem due to the velocity, variety, and volume, of the different sets of data they collect. Data comes through non-stop in different forms, from
-
Aug 16th, 2022
ThreatConnect CAL™
ThreatConnect’s Collective Analytics Layer (CAL) combines powerful insights from the ThreatConnect community of users with machine learning-powered analytics to generate actionable, high-fidelity th
-
Aug 5th, 2022
Community Powered Insight Gives Defenders the Advantage
Leveraging Automation and the Cloud to Improve Cyber Response Threats are moving faster than ever in today’s cyber threat environment. A timely and impactful response to an ongoing cyberattack is cr
-
Jul 26th, 2022
When It Comes To CRQ, What Is An “Open” Model and Is It The Right Question To Ask?
As more companies look to quantify cyber risk in financial terms, a common question we hear all the time is, “which model (or approach) should I use?.” I saw an interesting quote from a Gartne
-
Jul 21st, 2022
Leveraging Channels in Polarity
Discover how Polarity enhances data management with channels and annotations in this webinar. Learn from experts Joe Miller and Ed Dorsey to optimize your workflow and improve business operations.
-
Jul 21st, 2022
ThreatConnect at TechForum – Trends in Enterprise Security
ThreatConnect at TechForum – Trends in Enterprise Security TechForum – Trends in Enterprise Security – TechForum’s Security Forum aims to bring together IT managers and technology providers in
-
Jul 15th, 2022
Enterprise Defense at the Speed of Data
Quickly and efficiently turn data into intelligence and make informed decisions Today’s threats are relentless. Cyberattacks are often multi-year campaigns targeting valuable, sensitive data and hav
-
Jul 12th, 2022
Move Faster with ThreatConnect 6.6
Security teams need to move at the speed of the business. Teams don’t want to be slowed down by burdensome tasks like manually digging through threat intel or manually triaging alerts. They want to
-
Jun 24th, 2022
How Software Vendors Can Leverage Cyber Threat Intelligence for Threat Hunting
In recent years, there’s been an increase in attacks targeted specifically toward enterprise software vendors. Nation-states and cyber-criminal gangs are persistently attacking these organizations w
-
Jun 13th, 2022
ThreatConnect, Inc Named Winner of the Coveted Global InfoSec Awards and Expert Insights Awards 2022
ARLINGTON, Va.–(June 7th, 2022)–ThreatConnect Inc.® is proud to announce we have won the following awards from both Expert Insights, a leading resource for cybersecurity analysis, researc
-
Jun 1st, 2022
Prioritize Attack Analysis and Response With Actionable Intelligence
Analysts are overwhelmed by a number of things: the thousands of alerts they receive in a day, the intricacies of hidden details in email messages, embedded links, and attachments, or the inability to