Search results for:
-
Mar 22nd, 2022
How to SOAR with Risk Based Vulnerability Management
Risk-based vulnerability management (RBVM) is an ideal use case to operationalize and automate within SOAR as it needs to connect threat intelligence, data collection, enrichment, cross-team workflows
-
Mar 18th, 2022
Every Type of SOC Needs a SOAR
Many organizations have a Security Operations Center (SOC). It may not be one that has a large room full of analysts, engineers, threat hunters, and incident responders, with a wall of monitors
-
Mar 11th, 2022
To Code Or Not To Code
To code or not to code? That is the question that many security teams grapple with when attempting to solve a specific problem or introduce a new capability. While TIP and SOAR platforms like Threat
-
Mar 7th, 2022
How to: Dashboards for Ukraine Conflict Threat Intelligence
The ThreatConnect Platform is optimized for providing organizations the ability to create a custom dashboard for pulling together real-time, topical threat intelligence into a single view. The curre
-
Feb 12th, 2022
Redis
Redis is an open-source, in-memory data structure store that is used as a database, cache, and message broker.
-
Feb 11th, 2022
Key Functionalities of a Modern CTI Program
Everyone knows security is overloaded work wise – not everyone understands what that means. Cyber Threat Intelligence (CTI) is typically very technical so how can you convince the teams setting busi
-
Feb 8th, 2022
Operationalizing Cyber Risk Quantification
Cyber risk has long been acknowledged as one of the top risks facing companies of all sizes. Many security leaders struggle with communicating cyber risk in business and operational terms that matter
-
Feb 1st, 2022
Cybersecurity Under Stress – Burnout, High Turnover Rates and Higher Levels of Stress
ThreatConnect, Inc recently released a 2022 “Cybersecurity Under Stress” Report, highlighting the struggles Security Operations Teams are facing globally, how to pivot your organization’
-
Jan 25th, 2022
Let’s talk about CFOs and Cyber Risk
If you have read my previous three blogs in this ‘Let’s talk’ series, you’ll know that we’ve talked about our conversations with CISOs and CIO – and now it’s time to turn our attenti
-
Jan 25th, 2022
The Fastest Triage & Action Possible
Enhance cybersecurity analysis with Polarity. Boost memory recall, streamline data discovery, and improve collaboration through advanced tools like instant recall, federated search, and augmented real
-
Jan 21st, 2022
Software and Seinfeld with ThreatConnect’s CAL™
It’s been awhile since the CAL Analytics team has updated the world on our latest creations. Right before the holidays, we released our CAL 2.11 update (some months after our CAL 2.10 update). B
-
Jan 21st, 2022
Let’s talk about CIOs and Cyber Risk
In our previous blog, we looked at how cyber risk quantification (CRQ) can help CISOs and their teams to address some of the most pressing cybersecurity issues today. But change requires buy-in, so cr