Search results for:
-
Jan 3rd, 2025
Cyber Threat Data Aggregation
Cyber threat data aggregation is the meticulous process of collecting, consolidating, and analyzing all data relating to cyber threats. Data can come from multiple sources, including third-party sites
-
Jan 3rd, 2025
Vulnerability Remediation
Vulnerability remediation is a cybersecurity process that involves identifying threats or vulnerabilities in an organization's system or network. Depending on the existing IT infrastructure, vulnerabi
-
Jan 2nd, 2025
Polarity Customer Webinar: New Intelligence Insights & New Ways to Combat QR Code Attacks
Join us for a live webinar that explores some of Polarity’s latest features. As part of our merger with ThreatConnect, we now offer out-of-the-box intelligence that’s not available anywhere el
-
Jan 2nd, 2025
ThreatConnect’s 2024 Year in Review: Let’s Celebrate What We’ve Accomplished Together
With 2024 in our rearview mirror, let’s take a moment to reflect. Like always, threats are evolving, and security challenges are becoming… more challenging: escalations in targeted ransomware atta
-
Dec 20th, 2024
Federated Search
-
Dec 20th, 2024
Navigate ISO 27001:2022 Compliance with ThreatConnect
ISO 27001 has long set the standard for managing information security. Still, the 2022 updates bring a critical shift: organizations must now effectively process and analyze threat intelligence to sta
-
Dec 17th, 2024
DNS Query
DNS Query utilizes DNS commands on the command like to provide DNS information on IPs or Domains. It performs DNS lookups and displays the answers that are returned from the queried name server(s). Th
-
Dec 17th, 2024
Demo of Polarity Federated Search and Analysis Tool
Watch this on-demand demo of Polarity, federated search and analysis tool, led by Joe Rivela, SVP, Customer Success and Co-Founder of Polarity.io: Struggling with Data Overload and Slow Decision-Makin
-
Dec 13th, 2024
Unlocking the Potential of Cyber Threat Intelligence: A Guide to the Threat Intelligence Maturity Model
A rapidly evolving cyber threat landscape demands that organizations adopt more than reactive defenses—they need proactive, intelligence-driven strategies. The Threat Intelligence Maturity Model (TI
-
Dec 11th, 2024
New ThreatConnect President: ‘Nobody Else’ Unifying Threat Intelligence With ‘Risk-Based’ Approach
-
Dec 11th, 2024
ThreatConnect Appoints Chris Lehman as President of Global Field Operations
ThreatConnect announces Chris Lehman as President of Global Field Operations, leveraging his 30+ years of experience to drive growth in threat intelligence and risk quantification solutions.
-
Dec 9th, 2024
Toronto Raptors vs Boston Celtics
ThreatConnect invites you to join us at Scotiabank Arena as the Toronto Raptors take on the Boston Celtics! Network with top cybersecurity professionals while enjoying premium food, beverages, and the