Search results for:
-
Jul 22nd, 2019
Common & Best Practices for Security Operations Centers: Results of the 2019 SOC Survey
SANS recently surveyed their members in hopes to provide objective data to security leaders and practitioners who are looking to establish a SOC or optimize their existing SOCs. The most frequently ci
-
Jun 28th, 2019
A ThreatConnect Success Story: Automating the Process of Blocking Malicious Indicators with Playbooks
Find out how ThreatConnect helped a customer: Quickly build Playbooks and create proper workflow Speed up the process from identifying malicious indicators and getting block controls put in place fo
-
May 30th, 2019
A ThreatConnect Success Story: Identifying Additional Insights on Cyber Adversaries
Find out how ThreatConnect helped a customer: Validate their own findings regarding the adversaries they were tracking. Identify any known intelligence and operations gaps in analysis that pose a risk
-
Mar 29th, 2019
Mandiant Threat Intelligence
ThreatConnect and Mandiant Threat Intelligence have partnered to deliver Mandiant Threat Intelligence into the ThreatConnect platform. With this integration, cybersecurity teams are provided the neces
-
Mar 29th, 2019
ThreatConnect Training: Playbook Components
Watch this training to learn what components are, when to use them, and examples of components. We also show you how to design, use, and save a Component. At the end, we build a Component from scratch
-
Mar 22nd, 2019
The Hunt is On: Fusing Global Threat Intelligence with a Threat Intelligence Platform
Hear experts from Symantec and ThreatConnect discuss how to select and effectively use threat intelligence to thwart attacks. In this webinar, you will learn: the sources and categories of effective t
-
Mar 22nd, 2019
Threat Intelligence Isnt One Size Fits All
Threat intelligence (TI) can help any organization better protect themselves. With TI, you can identify threats and add context to them. Once you understand what you are facing, you can take decisive
-
Mar 22nd, 2019
Threat Intelligence Processes are a Journey; Not a Destination
A decade ago manual analytics were all the rage. Unfortunately, yesterday’s processes can no longer scale to the threats of today. For example, many organizations are still convinced the answer to t
-
Mar 22nd, 2019
ThreatConnect RSA® NetWitness® Suite Integration
ThreatConnect® and RSA® have partnered to enable users to detect and act on ThreatConnect intelligence in the NetWitness Platform. With this integration, users can aggregate their internal logs and
-
Mar 15th, 2019
ThreatConnect IBM QRadar Integration
ThreatConnect® and IBM® have partnered to enable users to detect and act on ThreatConnect intelligence from within IBM QRadar®. This integration allows users to combine validated Threat Intelligenc
-
Mar 13th, 2019
ThreatConnect Training, Workshops, and Services Catalog
Within this catalog, find a complete listing of ThreatConnect administered training, workshops, and service offerings. Constantly expanding, these offerings focus on kickstarting your experience with
-
Feb 28th, 2019
Rating Threat Intelligence: Skulls Scale for Cyber Threats
In order for threat intelligence sharing and community collaboration to work, we all need to be speaking the same language. We, the analysts at the front lines, need a standard vocabulary and a stan