Search results for:
-
Mar 30th, 2020
Detect Phishing Attempts Instantaneously with the Polarity-EmailRep Integration
Today’s post continues an ongoing series on Polarity Integrations. With over 100 powerful integrations, the Polarity Integrations Library allows users to connect Polarity to the tools they already u
-
Mar 27th, 2020
The Best Tools to Keep your Remote Security Team on the Same Page
Here at Polarity, we’re a remote-first team, meaning our culture and infrastructure is built around remote work – it’s part of our identity as an organization. If you’re now working from
-
Mar 26th, 2020
MalwareBazaar
MalwareBazaar is a project operated by abuse.ch. The purpose of the project is to collect and share malware samples, helping IT-security researchers and threat analysts protect their constituency and
-
Mar 26th, 2020
Fast Incident Response
FIR (Fast Incident Response) is a cybersecurity incident management platform designed to provide agility and speed in incident response.
-
Mar 20th, 2020
7 Tips for Working from Home
Many of us are stuck at working from home due to COVID-19. These are very surreal times. For some of you (us), being at home trying to work might be a whole new world. Well, we’re here to help navig
-
Mar 19th, 2020
Special Playbook Fridays: COVID-19 Dashboard, Metrics, and Search
We’ve got options for how you can track activity related to Coronavirus / COVID-19 in the ThreatConnect Platform: 1. New System Dashboard – COVID-19 Related Activity The ThreatConnect Rese
-
Mar 17th, 2020
Automation Anxiety? Don’t Worry.
More efficient processes. Better staff utilization. Increased documentation of processes. These are just a few of the benefits of automation, yet organizations may be slow to adopt automation technolo
-
Mar 13th, 2020
Playbook Fridays: ATT&CK Tag Framework
This Component creates a uniform structure for ATT&CK tags which can then be leveraged to create TQL queries, dashboards, or even newer Playbooks. And, since this is a Component, it can be added t
-
Feb 26th, 2020
Get Immediate Awareness of Malware with the Polarity-Cybereason Integration
With increasing speed and ferocity, Cyber Criminals are evolving their tactics and tools to target and hack even the most protected environments. Cybersecurity teams are struggling to efficiently dete
-
Feb 21st, 2020
Playbook Fridays: dan.me TOR Full List with Details
This Playbook gets the listing of TOR nodes from dan.me website and parses all of the information into ThreatConnect for consumption. TOR is often used by malicious actors to conceal their identity an
-
Feb 20th, 2020
Polarity User Tips: IP Social Distancing
In the opening act of 2020, we’re busier than ever. Building on 2019’s Productivity: Part I, we want to introduce 4 additional productivity hacks to give you back even more of your time this year
-
Feb 20th, 2020
ThreatConnect Introduces Workflow to Increase Efficiency and Accuracy During Analysis, Investigation, and Response
Latest version enables security teams to make faster and more informed decisions by providing a single Platform for threat intelligence analysis, incident response plans, and security processes. Febru