Search results for:
-
Sep 15th, 2020
ThreatConnect Buys Risk Quantification Firm Nehemiah Security
On September 10, 2020 CRN published the article “ThreatConnect Buys Risk Quantification Firm Nehemiah Security.” The article reported that ThreatConnect has purchased Nehemiah Security to he
-
Sep 15th, 2020
ThreatConnect Acquires Nehemiah Security to Add Risk Quantifier Capabilities
On September 10, 2020 Infosecurity Group published the article “ThreatConnect Acquires Nehemiah Security to Add Risk Quantifier Capabilities.” The article reported that ThreatConnect has acq
-
Sep 11th, 2020
Analyst1
Analyst1 allows you to take full control of your cyber security with complete visibility into threat activity. Our advanced threat intelligence platform empowers security teams to respond decisively t
-
Sep 11th, 2020
Research Roundup: Activity on Previously Identified APT33 Domains
Howdy, and welcome to the ThreatConnect Research Roundup, a collection of recent findings by our Research Team and items from open source publications that have resulted in Observations of related ind
-
Sep 10th, 2020
ThreatConnect Acquires Cyber Risk Quantification Pioneer Nehemiah Security
Creates the world’s only cybersecurity platform aligning the entire security lifecycle to the goal of reducing risk. Combination of Cyber Risk Quantification, Intelligence, Orchestration, Automation
-
Sep 10th, 2020
ThreatConnect: The Brain of Security
Why Acquiring Nehemiah Security was the Right Decision Since its inception, ThreatConnect has used the analogy that it wants to be the “brain of security,” to act as its central nervous system pro
-
Sep 9th, 2020
SOC Series: Domain Reputation on Sight
Today’s post begins a series on Polarity Security Operations Center (SOC) use cases; demonstrating how Polarity enables you to see the story in your data without sacrificing thoroughness or speed.
-
Sep 4th, 2020
ThreatConnect and MITRE ATT&CK: Supporting Sub-techniques
ThreatConnect has long supported the MITRE ATT&CK framework and, we are delighted to be among the first to support MITRE ATT&CK Sub-techniques. As a quick refresher, MITRE ATT&CK® is a gl
-
Sep 3rd, 2020
Research Roundup: Mustang Panda and RedDelta PlugX Using Same C2
Howdy, and welcome to the ThreatConnect Research Roundup, a collection of recent findings by our Research Team and items from open source publications that have resulted in Observations of related ind
-
Sep 3rd, 2020
Announcing the Polarity Community Contributor of the Quarter, September 2020
We would like to congratulate Shawn Thomas, SOC Manager at Verizon Media with The Paranoids and host of the Detections Podcast, as the Polarity Community Contributor of the quarter! Shawn has greatly
-
Sep 1st, 2020
Polarity User Tips: Using Annotations in Polarity
Today’s post continues an ongoing series on Polarity User Tips. Data tells a story, Polarity helps you see it with Augmented Reality overlaying contextual information as you work, giving you the rig
-
Sep 1st, 2020
LogRhythm
ThreatConnect® and LogRhythm® have partnered to enable users to detect and act on ThreatConnect intelligence in LogRhythm SIEM. With this integration, users are able to aggregate their internal logs