Search results for:
-
Jan 18th, 2021
SOAR: Proactive Threat Hunting (Part 2)
There are many definitions for Threat hunting from an active cyber defense activity that proactively and iteratively searches through networks to detect and isolate advanced threats that evade existin
-
Jan 17th, 2021
GitHub
GitHub, Inc. is an Internet hosting service for software development and version control using Git. It provides the distributed version control of Git plus access control, bug tracking, software featu
-
Jan 14th, 2021
Cyber Risk Quantification: The Pressure Is On (New Survey)
New survey suggests companies aren’t prepared or equipped to deliver cyber risk quantification data Cyber risk has long been acknowledged as one of the top risks facing companies of all sizes. And w
-
Jan 13th, 2021
Welcome to the Age of Automated Cyber Risk Quantification
This year the conversation about cyber risk and cyber risk quantification must change. Even the best vulnerability management program isn’t really addressing cyber risk. Did you know that more than
-
Jan 13th, 2021
Search for anything with the Polarity – Google Custom Search Integration Part 1
Today’s post continues an ongoing series on Polarity Integrations. Data tells a story, Polarity helps you see it with Augmented Reality overlaying contextual information from the applications you us
-
Jan 12th, 2021
SOC Series: Phishing Triage
Today’s post continues an ongoing series on Polarity Security Operations Center (SOC) use cases; demonstrating how Polarity helps you to see the story in your data without sacrificing thoroughness o
-
Jan 7th, 2021
Former CIA Cybersecurity Chief Speaks Out on Solar Winds Hack
In an exclusive interview with the ThreatConnect Podcast, Robert Bigman, the former Chief Information Security Officer (CISO) at the CIA, said when investigators complete their analysis into how the R
-
Jan 6th, 2021
Risk Quantification, Threat Intelligence & Automation: Stronger Together
ThreatConnect's marries cyber risk quantification (CRQ), threat intelligence platform (TIP), and SOAR capabilities.
-
Jan 6th, 2021
ANY.RUN
ANY.RUN is the first interactive online malware analysis sandbox. The service provides detection, analysis, and monitoring of cybersecurity threats. Based on the interactive approach of investigations
-
Dec 22nd, 2020
8 Ways SOC & IR Teams Can Use ThreatConnect’s Workflow Capability
ThreatConnect’s Workflow capability enables users to continuously improve security processes with a single Platform for process documentation, team collaboration, and artifact enrichment. With W
-
Dec 22nd, 2020
How to Use Workflow to Conduct Phishing Analysis Part 2 – Automating Phase 1
While most organizations (88% in 2019 according to ProofPoint’s State of the Phish 2020 report) are targeted by spear phishing emails each year, the processes by which these messages are triaged and
-
Dec 21st, 2020
Why Your SOAR Needs Threat Intel Management, Not Feed Management
When it comes to using threat intelligence to aid in the investigation of alerts or phishing, it’s essential to have the right feeds (whether OSINT or paid). We often get asked, “can I just dump f