Skip to main content

Explore Featured Resources

Showing 292 resources items
Sort

No Results Match Your Search

Please try again or contact marketing@threatconnect.com for more information on our resources.

Webinar: The Role of the CISO in Overhauling and Future-Proofing Cybersecurity
Security Operations

Webinar: The Role of the CISO in Overhauling and Future-Proofing Cybersecurity

The CISO Challenge Series Webinar is based on the ThreatConnect Podcast’s new series that explores the five strategic challenges facing chief information security officers globally and how CISOs are innovating to overcome those challenges. Join us for this live CISO Challenge Webcast where three leading global CISOs will offer their perspectives on overhauling and future-proofing […]

Prioritize CVEs by Financial Risk with Risk Quantifier
Cyber Risk Quantification

Prioritize CVEs by Financial Risk with Risk Quantifier

With ThreatConnect Risk Quantifier (RQ), understand the potential financial risk that Common Vulnerabilities and Exposures (CVE’s) introduce to your organization and prioritize your patching efforts based on this. With the ability to automate the quantification of CVEs you can prioritize them by the amount of financial risk they bring to the organization. Prioritize Common Vulnerabilities […]

Enhance Your GRC Solution with ThreatConnect RQ
Cyber Risk Quantification

Enhance Your GRC Solution with ThreatConnect RQ

Governance, Risk, and Compliance (GRC) solutions are oftentimes at the center of an organization’s processes when it comes to managing risk for the business. With that in mind, having the most comprehensive view of all risks directly from the GRC solution is critical. Cyber risk is among the top 3 risks companies face, yet is […]

What If Analysis
Cyber Risk Quantification

What If Analysis

What if you were asked what the quantified implications to cyber risk would be if your security budget was cut in half? Or maybe you might be tasked with deciding if it is possible to decrease security controls in one area and increase controls in another without any impact on financial risk. That’s why ThreatConnect […]

ThreatConnect RQ
Cyber Risk Quantification

ThreatConnect RQ

Security organizations need to continually quantify cyber risk in financial terms and require a partner that helps them automate and orchestrate the right response. With ThreatConnect Risk Quantifier™ (RQ), you can automate cyber risk quantification in hours, unlike other approaches that take months and provide little to no actionable value as a result.

ThreatConnect and IntelFinder
Threat Intelligence Operations

ThreatConnect and IntelFinder

IntelFinder is a fully automated and scalable service for customer–specific and actionable threat intelligence. The unique automated design enables IntelFinder to provide a comprehensive all–inclusive intelligence service at a fraction of the cost compared to existing services on the market. IntelFinder performs on–going monitoring to identify a wide variety of potential threats that exist outside […]

SANS Vulnerability Management Survey 2020
Orchestration and Automation

SANS Vulnerability Management Survey 2020

The SANS 2020 Automation and Integration Survey looks into how organizations are using automation to discover vulnerabilities and helps establish a thorough process to remediate vulnerabilities.

ThreatConnect and Shodan Integration
Threat Intelligence Operations

ThreatConnect and Shodan Integration

ThreatConnect® and Shodan® allow users to enrich their threat data and enhance their decision-making skills when performing an investigation.

Detection of Automatically Generated Domain Names in Real-time with Machine Learning
Security Operations

Detection of Automatically Generated Domain Names in Real-time with Machine Learning

In our ongoing mission to help make security practitioners faster and more effective at their jobs, we explored a series of machine learning techniques to help detect suspicious domains created via domain generation algorithms (DGAs).  While indicative of a sophisticated and well-resourced adversary, these DGAs can be tricky to track and traditional methods require substantial […]

Changing the Way Security Works – Risk|Threat|Response: The Acquisition of Nehemiah Security
Security Operations

Changing the Way Security Works – Risk|Threat|Response: The Acquisition of Nehemiah Security

In this webinar, we discussed the acquisition of Nehemiah Security. The company provides a simple SaaS solution — RQ (Risk Quantifier) — that enables organizations to identify the cyber risks that matter most by financially quantifying them and providing ROI based mitigations.

Security Operations

Empowering SecOps – Spend Time Where It Matters Most

In this webinar we explore in-depth how security analysts are spending their time versus where they believe they can have the biggest impact… and why the disconnect leads to burnout and turnover.

Incident Response

Proactive Infrastructure Hunting with ThreatConnect & DomainTools

In this webinar, explore how network defenders and incident responders can effectively and efficiently protect their own organizations.