Search results for:
-
Mar 30th, 2022
Censys
Censys is a cybersecurity company that offers Internet-wide continuous visibility and real-time risk assessment. Censys provides data-driven security used by researchers, corporations, and governments
-
Mar 30th, 2022
Bambenek Consulting
Bambenek Consulting is a cybersecurity investigations and intelligence consulting firm focusing on tackling major criminal threats. Services include the Well Fed Intelligence feeds used by thousands o
-
Mar 23rd, 2022
Peaky Blinders: Combat Ransomware Gangs with High Fidelity Intelligence-Driven Operations
The plague of ransomware continues to grow in 2022 with attacks raging through industries and affecting structures such as oil pipelines, payroll systems, and managed service provider software. Many r
-
Mar 23rd, 2022
Enabling Analysts: Intelligence-Driven CVE Enrichment & Remediation
Security analysts need the ability to filter out the noise and focus on what matters most – particularly when it comes to vulnerability management. By using threat intelligence to enrich respons
-
Mar 22nd, 2022
How to SOAR with Risk Based Vulnerability Management
Risk-based vulnerability management (RBVM) is an ideal use case to operationalize and automate within SOAR as it needs to connect threat intelligence, data collection, enrichment, cross-team workflows
-
Mar 18th, 2022
Every Type of SOC Needs a SOAR
Many organizations have a Security Operations Center (SOC). It may not be one that has a large room full of analysts, engineers, threat hunters, and incident responders, with a wall of monitors
-
Mar 11th, 2022
To Code Or Not To Code
To code or not to code? That is the question that many security teams grapple with when attempting to solve a specific problem or introduce a new capability. While TIP and SOAR platforms like Threat
-
Mar 7th, 2022
How to: Dashboards for Ukraine Conflict Threat Intelligence
The ThreatConnect Platform is optimized for providing organizations the ability to create a custom dashboard for pulling together real-time, topical threat intelligence into a single view. The curre
-
Feb 12th, 2022
Redis
Redis is an open-source, in-memory data structure store that is used as a database, cache, and message broker.
-
Feb 11th, 2022
Key Functionalities of a Modern CTI Program
Everyone knows security is overloaded work wise – not everyone understands what that means. Cyber Threat Intelligence (CTI) is typically very technical so how can you convince the teams setting busi
-
Feb 8th, 2022
Operationalizing Cyber Risk Quantification
Cyber risk has long been acknowledged as one of the top risks facing companies of all sizes. Many security leaders struggle with communicating cyber risk in business and operational terms that matter
-
Feb 1st, 2022
Cybersecurity Under Stress – Burnout, High Turnover Rates and Higher Levels of Stress
ThreatConnect, Inc recently released a 2022 “Cybersecurity Under Stress” Report, highlighting the struggles Security Operations Teams are facing globally, how to pivot your organization’