Skip to main content

Explore Featured Resources

Showing 292 resources items
Sort

No Results Match Your Search

Please try again or contact marketing@threatconnect.com for more information on our resources.

Use Cases and Quick Wins for Offensive Security & Vulnerability Management
Polarity

Use Cases and Quick Wins for Offensive Security & Vulnerability Management

Join our webinar to explore offensive security and vulnerability management with Joe Rivela. Learn practical applications, vulnerability triage, exposure assessments, and asset awareness to elevate your security operations.

ThreatConnect Low-Code Automation
Orchestration and Automation Threat Intelligence Operations

ThreatConnect Low-Code Automation

ThreatConnect’s Low-Code Automation gives you the flexibility, consistency, and rapid speed implementation your security team needs.

The Need for an Evolved Threat Intel Lifecycle Webinar
Threat Intelligence Operations

The Need for an Evolved Threat Intel Lifecycle Webinar

In order to evolve a threat intelligence function from a nice-to-have to an essential component of a security team, we need to unpack two key weaknesses of the threat intel lifecycle. Join us in this on-demand webinar were we explain why TI Ops requires an Evolved Threat Intelligence Lifecycle, one that emphasizes the planning and […]

Smarter Security Series – The Importance of Cyber Risk Quantification
Cyber Risk Quantification

Smarter Security Series – The Importance of Cyber Risk Quantification

Introducing ThreatConnect’s Smarter Security Expert Series! We’re interviewing the brightest minds in the cyber industry and getting their expertise on current trends and tips and tricks for a successful modern security team.  For our first guest, we’re joined by Colin Anderson, CISO at Ceridian and ThreatConnect’s newest Board Advisor! Colin sat down with our GM […]

Webinar: Smarter Security Series – How To Move Your CTI Team From A Reactive To Proactive Posture
Threat Intelligence Operations

Webinar: Smarter Security Series – How To Move Your CTI Team From A Reactive To Proactive Posture

Introducing ThreatConnect’s Smarter Security Expert Series! We’re interviewing the brightest minds in the cyber industry and getting their expertise on current trends and tips and tricks for a successful modern security team.  For our first guest, we’re joined by Colin Anderson, CISO at Ceridian and ThreatConnect’s newest Board Advisor! Colin sat down with our VP […]

Smarter Security Series – How To Move Your CTI Team From A Reactive To Proactive Posture
Threat Intelligence Operations

Smarter Security Series – How To Move Your CTI Team From A Reactive To Proactive Posture

  World-renowned Cybersecurity Executive Colin Anderson, recently sat down with Toby Bussa, VP of Product Marketing at ThreatConnect. Anderson is the Senior Vice President and CISO at Ceridian, a top HR Management Software company. With a vast and impressive career, Anderson has also held high-ranking roles at Levi Strauss and Safeway. Besides actively working in […]

Creating Channels That Matter
Polarity

Creating Channels That Matter

Polarity is a cutting-edge platform designed to help IT and cybersecurity professionals manage and utilize intelligence more effectively. By creating a “collective memory,” Polarity delivers real-time insights directly to users, ensuring critical information isn’t missed. Its core feature, Channels, organizes and tailors data into reference or collaborative groups, streamlining workflows and enhancing decision-making. Polarity empowers […]

Smarter Security Series – How Do You Operationalize Cyber Threat Intelligence and Where Do You Start?
Threat Intelligence Operations

Smarter Security Series – How Do You Operationalize Cyber Threat Intelligence and Where Do You Start?

Introducing ThreatConnect’s Smarter Security Expert Series! We’re interviewing the brightest minds in the cyber industry and getting their expertise on current trends and tips and tricks for a successful modern security team.  For our first guest, we’re joined by Colin Anderson, CISO at Ceridian and ThreatConnect’s newest Board Advisor! Colin sat down with our VP […]

Video: Smarter Security Series – The Importance Of Cyber Threat Intelligence In Today’s Industry
Threat Intelligence Operations

Video: Smarter Security Series – The Importance Of Cyber Threat Intelligence In Today’s Industry

Introducing ThreatConnect’s Smarter Security Expert Series! We’re interviewing the brightest minds in the cyber industry and getting their expertise on current trends and tips and tricks for a successful modern security team.  For our first guest, we’re joined by Colin Anderson, CISO at Ceridian and ThreatConnect’s newest Board Advisor! Colin sat down with our VP […]

Smarter Security Series – The Importance of Cyber Threat Intelligence in Today’s Industry
Threat Intelligence Operations

Smarter Security Series – The Importance of Cyber Threat Intelligence in Today’s Industry

Toby Bussa, Vice President of Product Marketing at ThreatConnect, recently sat down for a discussion about cyber threat intelligence with Colin Anderson. As a seasoned Cybersecurity Executive, Anderson, who has over 25 years of experience, is currently the Senior Vice President and CISO at Ceridian, a Human Resource Management software company. In this conversation, Bussa […]

Dawn of Threat Intelligence Operations White Paper
Threat Intelligence Operations

Dawn of Threat Intelligence Operations White Paper

Threat Intelligence Operations (TI Ops) is the evolution of the cyber threat intelligence function. TI Ops is critical for organizations that want to modernize their security operations to address increasingly hostile adversaries looking to take advantage of growing attack surfaces and increasing exposures.  Adopting a TI Ops approach is critical to getting ahead of the […]

Evolved Threat Intel Lifecycle Infographic
Threat Intelligence Operations

Evolved Threat Intel Lifecycle Infographic

The cyber threat intel lifecycle has been around for close to twenty years, and has been the de facto approach to operating a threat intel function. However, as threat intelligence needs to be operationalized, the lifecycle is showing its limits.  An Evolved Threat Intel Lifecycle is required that accounts for both the production and consumption […]