Skip to main content

Explore Featured Resources

Showing 292 resources items
Sort

No Results Match Your Search

Please try again or contact marketing@threatconnect.com for more information on our resources.

Incident Response

The Diamond Model: An Analyst’s Best Friend

During this video, 2 of the 3 co-authors of the Diamond Model for Intrusion Analysis, Sergio Caltagirone from Dragos and Andy Pendergast from ThreatConnect, talk about how to properly utilize the Diamond Model for Intrusion Analysis to triage incidents and categorize threat activity. ThreatConnect is the only threat intelligence platform built on the Diamond Model […]

ThreatConnect Platform

Four Things You Might Not Be Doing in ThreatConnect, But Should Be

Watch this webinar to learn about the top four things that we don’t always see customers doing, but that we think could be super helpful. They are also the four things that we get the most questions about from customers. You’ll learn about: Operationalizing and optimizing ThreatAssess/CAL in your environment. Tags and Attributes – when […]

ThreatConnect Platform

Identify, Manage, and Block Threats Faster: Webinar with ESG Lab

ESG Lab evaluated the ThreatConnect threat intelligence, analytics, and orchestration platform, TC Complete, and two components of the platform, TC Analyze and TC Identify. Their goal was to validate how the ThreatConnect platform enables organizations to identify, manage, and block threats with end-to-end detection capabilities and advanced analytics. View the webinar to hear ESG Senior […]

Threat Intelligence Operations

Collecting and Analyzing Intelligence About Potential Threats

Hear ThreatConnect’s Senior Threat Intelligence Researcher, Alex Valdivia, speak on a panel of experts on how to uncover the motivation and mitigation methods for threat actors targeting your organization.

ThreatConnect Platform

ThreatConnect’s Revamped Search Functionality

Find what you’re looking for quickly; even if you don’t find what you’re looking for, our new Search will point you in the right direction. Indicators, Groups, and Tags now all feature a “Graph View” that lets you visualize relationships in the data​ and uncover important associations.

ThreatConnect Platform

Playbooks ROI Calculator – How to Save Time and Money

Overview of our Playbooks ROI calculator, and how to display ROI in terms of time and money saved.  

Threat Intelligence Operations

Exploiting the Adversary How to the Proactive with Threat Intelligence

Understanding your adversary is essential to effective cybersecurity. In order to block threat actors, now and in the future, you must know where they have been before, what their techniques, tactics, and procedures are, and if they are targeting your specific organization. By gaining a deep understanding of your adversary, you can take steps to […]

Threat Intelligence Operations

Getting Started with Threat Intelligence

Just warming up to threat intelligence? Not sure where to start? Security professionals need to quickly identify real threats to their organization, even if they don’t have the budget to build out a dedicated threat intelligence team. Maintaining situational awareness can be a full time job, and your boss needs to know how the latest […]

ThreatConnect Platform

TQL & Dashboards: Better Insight into Your Threat Intelligence Operations

ThreatConnect’s new dashboards allow you to easily visualize data that shows the impact of your security efforts and gain a better understanding of the threats your organization faces. Join us for a training webinar where we’ll show you how you can set up dashboards tailored to your organization*. You’ll be able to automatically monitor your […]

ThreatConnect Platform

Setting Up the ThreatConnect TAXII Server User

The ThreatConnect® TAXII™ server can be used by an external TAXII client to retrieve data from a ThreatConnect user’s Organization and any Communities or Sources to which the user has access. To connect to the ThreatConnect TAXII server, the external TAXII client will require login credentials (username and password), which are configured by creating a […]

Threat Intelligence Operations

Mapping Connected infrastructure with ThreatConnect and Domain Tools

The more information you have about a potential threat, the better you can defend against it. In order to stay ahead of malicious actors, it is crucial that security teams add context and enrichment to their threat data. The combination of the DomainTools Spaces App for ThreatConnect and DomainTools Iris investigative platform empower security professionals […]

Threat Intelligence Operations

ThreatConnect Intelligence: What is it and how do I best utilize it?

Watch this webinar to learn: – Where do I access ThreatConnect Intelligence? – What does ThreatConnect Intelligence include? – How do I find intelligence relevant to my industry? – Don’t have ThreatConnect Intelligence – how do I get it?