Search results for:
-
Mar 22nd, 2019
The Hunt is On: Fusing Global Threat Intelligence with a Threat Intelligence Platform
Hear experts from Symantec and ThreatConnect discuss how to select and effectively use threat intelligence to thwart attacks. In this webinar, you will learn: the sources and categories of effective t
-
Mar 22nd, 2019
Threat Intelligence Isnt One Size Fits All
Threat intelligence (TI) can help any organization better protect themselves. With TI, you can identify threats and add context to them. Once you understand what you are facing, you can take decisive
-
Mar 22nd, 2019
Threat Intelligence Processes are a Journey; Not a Destination
A decade ago manual analytics were all the rage. Unfortunately, yesterday’s processes can no longer scale to the threats of today. For example, many organizations are still convinced the answer to t
-
Mar 22nd, 2019
ThreatConnect RSA® NetWitness® Suite Integration
ThreatConnect® and RSA® have partnered to enable users to detect and act on ThreatConnect intelligence in the NetWitness Platform. With this integration, users can aggregate their internal logs and
-
Mar 15th, 2019
ThreatConnect IBM QRadar Integration
ThreatConnect® and IBM® have partnered to enable users to detect and act on ThreatConnect intelligence from within IBM QRadar®. This integration allows users to combine validated Threat Intelligenc
-
Mar 13th, 2019
ThreatConnect Training, Workshops, and Services Catalog
Within this catalog, find a complete listing of ThreatConnect administered training, workshops, and service offerings. Constantly expanding, these offerings focus on kickstarting your experience with
-
Feb 28th, 2019
Rating Threat Intelligence: Skulls Scale for Cyber Threats
In order for threat intelligence sharing and community collaboration to work, we all need to be speaking the same language. We, the analysts at the front lines, need a standard vocabulary and a stan
-
Feb 22nd, 2019
A ThreatConnect Success Story: Using Automation to Collaborate with Partners
Learn how ThreatConnect solved these problems for a customer: Improved focus on alerts within the organization Significant workload reduction through automated enrichment Consistent communication of t
-
Feb 21st, 2019
Using Visualization to Make Threat Intelligence Actionable
Follow along with Dan Cole, Director of Product Management, and Drew Gidwani, Director of Analytics, as they discuss how to use visualization to make threat intelligence actionable. Tune into this web
-
Feb 21st, 2019
Playbook Fridays: QRadar Tag Search
Ground truth is one of the most important sources informing threat intelligence. A key source of this truth is what’s happening in the SIEM- QRadar in this case. Knowing this, we needed a way to the
-
Feb 21st, 2019
The Diamond Model: An Analyst’s Best Friend
During this video, 2 of the 3 co-authors of the Diamond Model for Intrusion Analysis, Sergio Caltagirone from Dragos and Andy Pendergast from ThreatConnect, talk about how to properly utilize the Diam
-
Feb 21st, 2019
Four Things You Might Not Be Doing in ThreatConnect, But Should Be
Watch this webinar to learn about the top four things that we don’t always see customers doing, but that we think could be super helpful. They are also the four things that we get the most questions