Search results for:
-
Jan 25th, 2022
The Fastest Triage & Action Possible
Enhance cybersecurity analysis with Polarity. Boost memory recall, streamline data discovery, and improve collaboration through advanced tools like instant recall, federated search, and augmented real
-
Jan 21st, 2022
Software and Seinfeld with ThreatConnect’s CAL™
It’s been awhile since the CAL Analytics team has updated the world on our latest creations. Right before the holidays, we released our CAL 2.11 update (some months after our CAL 2.10 update). B
-
Jan 21st, 2022
Let’s talk about CIOs and Cyber Risk
In our previous blog, we looked at how cyber risk quantification (CRQ) can help CISOs and their teams to address some of the most pressing cybersecurity issues today. But change requires buy-in, so cr
-
Jan 19th, 2022
Let’s Talk About CISOs and Cyber Risk Quantification
Chief Information Security Officers (CISOs) serve a critical role in protecting their business from internal and external threats. They need to design and implement the right resources to mitigate gro
-
Jan 14th, 2022
It’s Time to Make Crypto Assets First-Class Citizens in Threat Intelligence
As the world evolves from Web 2.0 to Web 3.0 – think decentralized protocols for crypto assets, identities, and compute-services leveraging blockchain technology – cyber threat teams must
-
Jan 14th, 2022
4 Key Drivers Accelerating Cyber Risk Quantification
If you’ve attended any of our webinars on Cyber Risk Quantification (CRQ) in recent months, you’ll know that this is a topic I love talking about! You’re either thinking this is not true, or Iâ€
-
Dec 29th, 2021
ThreatConnect’s Top 5 Webinars In 2021
A survey by the Independent revealed that a typical British household will watch a staggering 62 hours of TV, shows, and movies over the Holiday period between December 20th and January 2nd! But I’m
-
Dec 22nd, 2021
Op-Ed: Cybersecurity, The New Pillar of Business
Cybersecurity can sometimes be treated as an afterthought. However, with the recent surge in ransomware and cyberattacks, it’s coming to light just how important it truly is. Everyone understands wh
-
Dec 22nd, 2021
The UK’s Cyber Strategy 2022: The 5 Pillars
This past year has seen ruthless cyber attacks on individuals, businesses and nation-states. Colonial Pipeline, Ireland’s Health Service Executive (HSE), JBS, and Florida’s Water Supply are ju
-
Dec 20th, 2021
Log4J: A ThreatConnect Vulnerability Prioritization and Report Story
The recent Log4J vulnerability (CVE-2021-44228) issue has set the cybersecurity world ablaze. Security teams are working overtime to quickly patch vulnerabilities and better understand how this issue
-
Dec 2nd, 2021
Let Data Help Your SOC Team SOAR
Data is often the instrument that comes to mind when leaders think about accelerating business strategy, but the framework of people, processes, and technology (PPT) together has long been understood
-
Dec 2nd, 2021
ThreatConnect 6.4: Empowering Threat Intel Teams
Context is everything. The newest release from ThreatConnect helps cyber threat intelligence (CTI) teams get more context quickly, enables faster investigations, provides a more robust threat library,