Search results for:
-
Jun 2nd, 2020
Do Androids Dream of Electric CALFs?
CAL 2.5 introduces an additional CAL Feed that uses defined criteria to identify NRDs that we believe have been created using a domain generation algorithm (DGA). Just a few short months ago we anno
-
Jun 2nd, 2020
ThreatConnect Expands Presence to the Middle East and Gulf Cooperation Council (GCC) through Strategic Partnership with Spire Solutions
Relationship brings industry’s only intelligence-driven security operations solutions to Large Enterprise and Governments in region Arlington, VA, USA and Dubai, United Arab Emirates, June 2, 20
-
May 29th, 2020
Polarity Reference Channels: Microsoft Bug Check Code References
Today’s post continues an ongoing series on Polarity User Tips. Data tells a story, Polarity helps you see it with Augmented Reality overlaying contextual information as you work, giving you the rig
-
May 29th, 2020
Cyber Risk Analytics
Cyber Risk Analytics (CRA) provides actionable threat intelligence about organizations that have experienced a data breach or leaked credentials.
-
May 28th, 2020
ThreatConnect Research Roundup: Suspected Naikon DGA Domains
May 28 2020 Edition Howdy, and welcome to the ThreatConnect Research Roundup, a collection of recent findings by our Research Team and items from open source publications that have resulted in Observa
-
May 27th, 2020
Cortex XSOAR
Cortex™ XSOAR is a comprehensive security orchestration, automation and response (SOAR) platform that unifies case management, automation, real-time collaboration and threat intel management to serv
-
May 26th, 2020
Strengthen Business and Security Alignment with ThreatConnect
ThreatConnect is changing the way security works and that means better alignment with, and transparency to, the business. ThreatConnect’s intelligence-driven, security operations solutions include b
-
May 21st, 2020
Spur
Spur provides cutting-edge tools and data to detect VPNs, residential proxies, and bots – helping you stay ahead of the latest evasion methods.
-
May 21st, 2020
ThreatConnect Research Roundup: Possible APT33 Infrastructure
May 21 2020 Edition Howdy, and welcome to the ThreatConnect Research Roundup, a collection of recent findings by our Research Team and items from open source publications that have resulted in Observa
-
May 21st, 2020
Polarity
If you had a photographic memory, how much faster would you be at your job? Now what if you had a collective memory across all members of your team, organization, or industry, how much better would yo
-
May 15th, 2020
ThreatConnect and Jira: Automating Processes Made Easier
We’ve expanded our Jira integrations and now support more use cases with new ThreatConnect Apps. The existing ThreatConnect Playbook App for Jira Core has been improved and a brand new Playbook App
-
May 15th, 2020
Polarity User Tips: The Ultimate Guide to Leveraging Color Theory for Instant Data Recognition
Today’s post continues an ongoing series on Polarity User Tips. Data tells a story, Polarity helps you see it with Augmented Reality overlaying contextual information as you work giving you the rig