Search results for:
-
Dec 13th, 2016
Hacktivists vs Faketivists: Fancy Bears in Disguise
What is a faketivist? One of the more surprising stories of 2016 was the Russian effort to shape the outcome of the U.S. presidential election. What surprised us most at ThreatConnect was not Russian
-
Dec 8th, 2016
7 Threat Intelligence Tools Your Team Needs
In today’s world cyber criminals are working hard to constantly come up with new tools, techniques, and procedures to infiltrate networks, socially engineer users and employees, steal money or i
-
Dec 7th, 2016
Oasis
The OASIS Cyber Threat Intelligence (CTI) TC was chartered to define a set of information representations and protocols to address the need to model, analyze, and share cyber threat intelligence.
-
Dec 7th, 2016
OpenC2
The Open Command and Control Forum promotes the global development and adoption of the OpenC2 language and reference material.
-
Nov 28th, 2016
Guidepoint Security
GuidePoint Security provides customized, innovative and valuable information security solutions that enable commercial and federal organizations to more successfully achieve their security and busines
-
Nov 25th, 2016
Liquid PC
Liquid PC is a specialized global distributor for all virtualization, security, business productivity, licensing software and technically sophisticated products. In addition, our team has expertise in
-
Nov 25th, 2016
Cofense
Cofense, formerly PhishMe, is the leading provider of human-driven phishing defense solutions worldwide. We deliver a collaborative approach to cybersecurity by enabling organization-wide engagement t
-
Nov 22nd, 2016
How Companies Use ThreatConnect to Make Their Cybersecurity Programs More Efficient: A Use Case
Make Your Cybersecurity Program More Efficient Using ThreatConnect This is the second in a series of blog posts about how organizations are utilizing the ThreatConnect platform. We’re sharing st
-
Nov 17th, 2016
How Companies Use ThreatConnect When Building Their Cybersecurity Program: A Use Case
Build Your Cybersecurity Program Using ThreatConnect This is the first in a series of blog posts about how organizations are utilizing the ThreatConnect platform. We’ll share stories of how customer
-
Nov 3rd, 2016
Optiv
Optiv is the largest comprehensive pure-play cyber security solutions provider in North America. Our diverse and talented employees are committed to helping businesses, governments and educational ins
-
Nov 3rd, 2016
Carahsoft
Carahsoft Technology Corp. is the trusted Government IT solutions provider, supporting an ecosystem of manufacturers, value-added resellers, system integrators, and consulting partners committed to he
-
Nov 2nd, 2016
Step 1: Collect and Correlate Relevant Threat Data
How to Aggregate Relevant Threat Data Is your cybersecurity team small? Or, are you looking to make your team more efficient? It can be difficult to know where to start when you have limited resource