Search results for:
-
Oct 19th, 2020
Use Cases and Quick Wins for Security Operations Centers
Revolutionize your SOC with Polarity's augmented reality tool. Streamline workflows, enhance decision-making, and boost security efficiency.
-
Oct 19th, 2020
Use Cases and Quick Wins for Threat Intelligence Teams
Strengthen your security operations with Polarity. Access real-time threat intelligence, simplify decision-making, and maximize efficiency with effortless integration across more than 180 tools.
-
Oct 19th, 2020
End-to-End Triage of Atomic Indicators with Polarity
Discover how Wyndham Hotels & Resorts enhanced cybersecurity with Polarity, streamlining threat response and boosting collaboration. Download the case study!
-
Oct 16th, 2020
ThreatConnect Research Roundup: Possible Ryuk Infrastructure
Howdy, and welcome to the ThreatConnect Research Roundup, a collection of recent findings by our Research Team and items from open source publications that have resulted in Observations of related ind
-
Oct 15th, 2020
Archer
Archer is a platform that provides a common framework for managing risk and compliance in the context of a business, which is necessary for governance, risk, and compliance (GRC) programs to succeed i
-
Oct 14th, 2020
Caught in our Net
Using neural networks to identify algorithmically generated domains (AGDs) The problem with today’s generation A while back, we released a new CAL Feed that leveraged our ability to detect domains t
-
Oct 13th, 2020
ThreatConnect and Check Point: Better Endpoint Protection
ThreatConnect has partnered with Check Point and built a Playbook App for our joint customers to leverage. With the addition of this new Playbook App, immediate actions can be taken to investigate, st
-
Oct 9th, 2020
How to Use Workflow to do Phishing Analysis Part 1 – Defining the Process
Workflow Refresher Earlier this year, in ThreatConnect 6.0, we released a new feature called Workflow. This capability enables users to define and memorialize processes for teams across the security o
-
Oct 7th, 2020
JIRA
Jira Software is part of a family of products designed to help teams of all types manage work. Originally, Jira was designed as a bug and issue tracker. But today, Jira has evolved into a powerful wor
-
Oct 2nd, 2020
Research Roundup: Kimsuky Phishing Operations Putting in Work
Howdy, and welcome to the ThreatConnect Research Roundup, a collection of recent findings by our Research Team and items from open source publications that have resulted in Observations of related ind
-
Oct 1st, 2020
SOC Series: Flawless Handoffs During Shift Change
Today’s post continues an ongoing series on Polarity Security Operations Center (SOC) use cases; demonstrating how Polarity augments analysts to deliver superhuman recall and contextual awareness. W
-
Sep 29th, 2020
Get Context from MISP Warning Lists as You Work Using the Polarity Integration
Today’s post continues an ongoing series on Polarity Integrations. Data tells a story, Polarity helps you see it with Augmented Reality overlaying contextual information from the applications you us