Search results for:
-
Mar 9th, 2017
Share The Love: Using ThreatConnect as a Threat Intelligence Sharing Platform for ISACs, ISAOs, and their Members
How  ISACs, ISAOs, and their members use ThreatConnect’s threat intelligence sharing platform effectively to share threat Information For those who read “share the love” and hoped t
-
Mar 2nd, 2017
The FORCE of STIX & TAXII: Why STIX & TAXII are so Important to Financial Services Companies & EMEA
The Force of STIX & TAXII Use the force, Luke. If your cybersecurity team were given a common threat intelligence language and transport method that surrounded, penetrated, and bound you in an imp
-
Mar 2nd, 2017
ThreatConnect Adds Seven Key Partners to its more than 100 Current Integrations
ThreatConnect proves commitment to extensibility and a unified defense by integrating with Phantom Cyber, Recorded Future and Other Related Technologies Arlington, VA – March 2, 2017 – Â Â
-
Feb 27th, 2017
Measuring the Detection and Response Gap
Measuring the Detection and Response Gap Despite efforts to stockpile the best technology and assemble an army of defenders, today’s security organizations struggle with inefficiencies. Threat a
-
Feb 16th, 2017
Research One: A ThreatConnect Story
Research One: A ThreatConnect Story We’re excited to announce the availability of our newest product: TC Identifyâ„¢, a threat-driven, context-enriched intelligence source provided through, and
-
Feb 13th, 2017
ThreatConnect Launches Four New Products for Security Operations, Analysis and Threat Intelligence
Organizations of all sizes and maturity levels will have an intelligence-driven defense with ThreatConnect Arlington, VA – February 13, 2016 – Â Recognizing that security operations and th
-
Feb 9th, 2017
ThreatConnect Announces Agreement with BT
BT Security Threat Intelligence Now With ThreatConnect Platform February 9, 2017 – Arlington, VA – As organizations recognise the need and importance of managing cyber threats, they also need to k
-
Jan 31st, 2017
Towards Data-Driven Threat Analysis
Make Better Decisions Based on Your Indicators of Compromise A random person on the Internet once said, “Threat Intelligence is a lot more than Intel feeds.” This person was absolutely rig
-
Jan 31st, 2017
ThreatConnect Provides Enhanced Intelligence through Global Context with ThreatAssess and CAL™
With ThreatConnect’s two newest Analytic Features, Users Gain Immediate Insight into Threats to Their Network January 31, 2017 – Arlington, VA – ThreatConnect®, provider of the indu
-
Jan 25th, 2017
Stepping to Fancy Bear
Stepping to FANCY BEAR (or how to efficiently validate and enrich a jumbled list of indicators) Over the last few weeks the U.S. government released two reports on Russian hacking and influence operat
-
Dec 21st, 2016
Do You Make Swords, or Do You Wield Them?
Classifying Analysts: Intelligence Producers and Intelligence Consumers The disciplines of swordsmith and swordsman have been intrinsically linked since the dawn of war. Â The swordsmith who crafted t
-
Dec 15th, 2016
How Companies Use ThreatConnect To Create a System of Record: A Use Case
This is the third in a series of blog posts about how organizations are utilizing the ThreatConnect platform. We’re going to share stories of how customers just like you have transformed their secur