Search results for:
-
Oct 26th, 2020
ThreatConnect Research Roundup: Ryuk and Domains Spoofing ESET and Microsoft
Howdy, and welcome to the ThreatConnect Research Roundup, a collection of recent findings by our Research Team and items from open source publications that have resulted in Observations of related ind
-
Oct 23rd, 2020
Sumo Logic
Sumo Logic is a pioneer of continuous intelligence, a new category of software, which enables organizations of all sizes to address the data challenges and opportunities presented by digital transform
-
Oct 23rd, 2020
SOC Series: Share with Your Friends in IR
Today’s post continues an ongoing series on Polarity Security Operations Center (SOC) use cases; demonstrating how Polarity helps you to see the story in your data without sacrificing thoroughness o
-
Oct 22nd, 2020
SOC Series: Get More from SOAR
Today’s post continues an ongoing series on Polarity Security Operations Center (SOC) use cases, demonstrating how Polarity helps you to see the story in your data without sacrificing thoroughness o
-
Oct 19th, 2020
Polarity Case Study: Financial Service
Discover how Polarity delivered 200% ROI for a financial services company by streamlining security operations, cutting task times by 60%, and boosting efficiency across teams.
-
Oct 19th, 2020
Leverage channel and integration colors for in-line context: Malware Analysis
Enhance cybersecurity with Polarity's Malware Color Guide. Use color-coded visuals to prioritize threats, streamline analysis, and improve decision-making.
-
Oct 19th, 2020
Use Cases and Quick Wins for Security Operations Centers
Revolutionize your SOC with Polarity's augmented reality tool. Streamline workflows, enhance decision-making, and boost security efficiency.
-
Oct 19th, 2020
Use Cases and Quick Wins for Threat Intelligence Teams
Strengthen your security operations with Polarity. Access real-time threat intelligence, simplify decision-making, and maximize efficiency with effortless integration across more than 180 tools.
-
Oct 19th, 2020
End-to-End Triage of Atomic Indicators with Polarity
Discover how Wyndham Hotels & Resorts enhanced cybersecurity with Polarity, streamlining threat response and boosting collaboration. Download the case study!
-
Oct 16th, 2020
ThreatConnect Research Roundup: Possible Ryuk Infrastructure
Howdy, and welcome to the ThreatConnect Research Roundup, a collection of recent findings by our Research Team and items from open source publications that have resulted in Observations of related ind
-
Oct 15th, 2020
Archer
Archer is a platform that provides a common framework for managing risk and compliance in the context of a business, which is necessary for governance, risk, and compliance (GRC) programs to succeed i
-
Oct 14th, 2020
Caught in our Net
Using neural networks to identify algorithmically generated domains (AGDs) The problem with today’s generation A while back, we released a new CAL Feed that leveraged our ability to detect domains t