Search results for:
-
Feb 4th, 2019
Fragmentation: The “Silent Killer” of Your Security Management Program
Extreme fragmentation of enterprise security people, processes, and technologies is contributing to the “Detection Deficit” between attackers and defenders reaching an all-time high and trending
-
Feb 3rd, 2019
ThreatConnect Overview and DomainTools Integration
Using DomainTools’ branded Reverse Whois and Registrant Alert services in ThreatConnect’s Track feature, ThreatConnect customers are able to research malicious domain registrants from the industry
-
Feb 3rd, 2019
Applying Threat Intelligence to the Star Wars’ Battle of Yavin
If the Empire had been able to make sense of the intelligence they were gathering and had been able to connect the dots to reveal contextual information, they could have prevented their own demise, an
-
Feb 1st, 2019
The Business Case for Threat Intelligence
Take 30 minutes of your time to hear ThreatConnect, Inc. CEO Adam Vincent review the need for businesses to evaluate the cost of a sophisticated threat intelligence program. Learn more about the ROI c
-
Feb 1st, 2019
ThreatConnect For Managed Security Service Providers
MSSPs offer protection that many businesses simply can’t live without. With ThreatConnect, you can deliver even more value. ThreatConnect partners with MSSPs worldwide to use threat intelligence to
-
Jan 31st, 2019
Decoding Threat Intelligence
Watch Rick Holland, principal security and risk analyst for Forrester Research, and Adam Vincent, CEO of ThreatConnect, lead “Decoding Threat Intelligence.”
-
Jan 31st, 2019
ThreatConnect and Cofense Intelligence
Cofense Intelligence andThreatConnect deliver the ability to acquire, aggregate and take action from phishing-specific machine-readable threat intelligence (MRTI). Using high fidelity phishing inte
-
Feb 3rd, 2019
ThreatConnect and Arcsight Joint Solution Brief
ThreatConnect® and Micro Focus have partnered to enable users to detect and act on ThreatConnect intelligence in ArcSight Enterprise Security Management (ESM)™. This integration allows users to com
-
Jan 31st, 2019
Project CameraShy Closing The Aperture On China’s Unit 78020
China is aggressively claiming territory deeper into the South China Sea, threatening economic and political stability in the Southeast Asia and beyond. The territorial activity is accompanied by high
-
Jan 30th, 2019
Threat Intelligence Platforms
Everything you’ve ever wanted to know but didn’t know to ask Today’s threat environment is complex and dynamic. The internet was built for connectivity, not security, and approaches such
-
Jan 28th, 2019
ThreatConnect and Crowdstrike Falcon Host
Through an expanded partnership with CrowdStrike, ThreatConnect® users can now act on intelligence in CrowdStrike Falcon Host. This integration allows users to discover and investigate both current a
-
Jan 28th, 2019
The Diamond Model for Intrusion Analysis
“The Diamond Model for Intrusion Analysis” is the product of years worth of research and development by expert security analysts working on some of the toughest cyber security problems. Informal