Skip to main content

Explore Featured Resources

Showing 292 resources items
Sort

No Results Match Your Search

Please try again or contact marketing@threatconnect.com for more information on our resources.

Smarter Security Series – The Importance of Cyber Threat Intelligence in Today’s Industry
Threat Intelligence Operations

Smarter Security Series – The Importance of Cyber Threat Intelligence in Today’s Industry

Toby Bussa, Vice President of Product Marketing at ThreatConnect, recently sat down for a discussion about cyber threat intelligence with Colin Anderson. As a seasoned Cybersecurity Executive, Anderson, who has over 25 years of experience, is currently the Senior Vice President and CISO at Ceridian, a Human Resource Management software company. In this conversation, Bussa […]

Dawn of Threat Intelligence Operations White Paper
Threat Intelligence Operations

Dawn of Threat Intelligence Operations White Paper

Threat Intelligence Operations (TI Ops) is the evolution of the cyber threat intelligence function. TI Ops is critical for organizations that want to modernize their security operations to address increasingly hostile adversaries looking to take advantage of growing attack surfaces and increasing exposures.  Adopting a TI Ops approach is critical to getting ahead of the […]

Evolved Threat Intel Lifecycle Infographic
Threat Intelligence Operations

Evolved Threat Intel Lifecycle Infographic

The cyber threat intel lifecycle has been around for close to twenty years, and has been the de facto approach to operating a threat intel function. However, as threat intelligence needs to be operationalized, the lifecycle is showing its limits.  An Evolved Threat Intel Lifecycle is required that accounts for both the production and consumption […]

How ThreatConnect Enables Cyber Fusion Operations
Threat Intelligence Operations

How ThreatConnect Enables Cyber Fusion Operations

Download our whitepaper to learn how the Intelligence-Powered Security Operations approach changes the game for cyber fusion operations with increased collaboration and improved efficiency, which lightens the load for everyone on the team and better protects the organization. 

Operationalizing Cyber Threat Intelligence Webinar
Threat Intelligence Operations

Operationalizing Cyber Threat Intelligence Webinar

Cyber threat intelligence is a necessary part of all modern Security Operations teams, but what do you do with it? Data and algorithms are the fuels for insights and driving decisions in a modern digital business, and cyber threat intelligence (CTI) is the fuel for modern security operations. Operationalizing threat intelligence requires the right mix […]

Threat Intelligence Operations

Customer Story: Global Aerospace and Defense Company – Consolidating Threat Intelligence & Automating Processes With Playbooks

Company Type: Aerospace & Defense Technologies Industry: Aerospace & Defense Company Size: Global Fortune 400   Challenge This Global Fortune 400 Aerospace & Defense organization works with multiple separate business units that each have their own set of unique use cases for threat intelligence standard operating procedures (SOPs). This includes specific tags per business unit, […]

Orchestration and Automation

Customer Story: Large U.S. Health System – Phishing Automation and Bulk Importing and Enrichment of Indicators

Company Type: Hospital System Industry: Healthcare Company Size: 50 Hospitals across 7 states   Challenge This large, multi-state health system’s major challenges involved automating Threat Intelligence collection, IOC enrichment, creating workflow templates, and improving Case Management. The main use cases were around phishing automation and bulk importing and enrichment of indicators (using VirusTotal) and specific […]

Cyber Risk Quantification

Customer Story: National Medical Insurance Provider Quantifies Risk

Company Type: Medical Insurance Provider Industry: Healthcare Company Size: 40 Independent Operating Companies   Challenge Healthcare Cyber Risk: The healthcare company was unable to consistently measure cyber risk across its member companies, and had difficulty accurately showing the potential financial impact of a successful attack. They also were challenged by subjective project prioritization that did not […]

Threat Intelligence Operations

Customer Story: Large Enterprise Needed Centralized Threat Intelligence Management

Company Type: Software Provider Industry: Technology Company Size: 130,000+ Employees Challenge This large technology client was looking for a centralized repository of contextualized threat intelligence, from which humans and machines can get a unified view to derive associations, prioritize, and collaborate on observations. The solution needed to be able to collect, normalize, and disseminate data […]

Need a Polarity refresher? Watch this 5 minute video.
Polarity

Need a Polarity refresher? Watch this 5 minute video.

Polarity is a cutting-edge data fusion platform designed to streamline workflows, enhance decision-making, and improve visibility across your organization. By unifying both internal and external data sources into a single platform, Polarity eliminates blind spots and reduces time wasted switching between tools. With seamless integration across 180+ systems—including custom-built solutions—Polarity offers features like automated searches, […]

A Guided Quickstart of Polarity
Polarity

A Guided Quickstart of Polarity

Watch our Quickstart onboarding video with Joe Rivela to master Polarity’s features. Learn seamless installation, powerful integrations, and boost your efficiency and decision-making.

Polarity Use Cases: MSSP & MDR
Polarity

Polarity Use Cases: MSSP & MDR

Enhance your MSSP and MDR operations with Polarity. Boost efficiency, reduce false positives, and accelerate threat analysis.