Skip to main content
Dataminr Redefines Cyber Defense with AI-Powered Client-Tailored Intelligence and Autonomous Threat and Exposure Management
Learn More
Request a Demo

Explore Featured Resources

Showing 263 resources items
Sort

No Results Match Your Search

Please try again or contact marketing@threatconnect.com for more information on our resources.

Fragmentation: The “Silent Killer” of Your Security Management Program
Security Operations

Fragmentation: The “Silent Killer” of Your Security Management Program

Extreme fragmentation of enterprise security people, processes, and technologies is contributing to the “Detection Deficit” between attackers and defenders reaching an all-time high and trending wider. In this paper we’ll take a look at the issues and lay out a path toward better security through better unity.

Threat Intelligence Operations

ThreatConnect Overview and DomainTools Integration

Using DomainTools’ branded Reverse Whois and Registrant Alert services in ThreatConnect’s Track feature, ThreatConnect customers are able to research malicious domain registrants from the industry’s longest running and most comprehensive searchable database of domain name registration and hosting data. DomainTools and ThreatConnect offer users the best DNS based threat intelligence capability on the market.

Applying Threat Intelligence to the Star Wars’ Battle of Yavin
Threat Intelligence Operations

Applying Threat Intelligence to the Star Wars’ Battle of Yavin

If the Empire had been able to make sense of the intelligence they were gathering and had been able to connect the dots to reveal contextual information, they could have prevented their own demise, and stopped a decades-long saga from unfolding.

ThreatConnect For Managed Security Service Providers
ThreatConnect Platform

ThreatConnect For Managed Security Service Providers

MSSPs offer protection that many businesses simply can’t live without. With ThreatConnect, you can deliver even more value. ThreatConnect partners with MSSPs worldwide to use threat intelligence to improve and enhance the security and quality of service that providers offer to their clients. Many MSSPs integrate the ThreatConnect platform into their organization’s operations and into […]

ThreatConnect and Cofense Intelligence
Threat Intelligence Operations

ThreatConnect and Cofense Intelligence

Cofense Intelligence andThreatConnect deliver the ability to acquire, aggregate and take action from phishing-specific machine-readable threat intelligence (MRTI). Using high fidelity phishing intelligence means that analysts can prioritize and decisively respond to alerts from intelligence consumed via Cofense’s API. With ThreatConnect, security teams are able to take action based on Cofense Intelligence indicators through their existing infrastructure to […]

ThreatConnect and Arcsight Joint Solution Brief
Threat Intelligence Operations

ThreatConnect and Arcsight Joint Solution Brief

ThreatConnect® and Micro Focus have partnered to enable users to detect and act on ThreatConnect intelligence in ArcSight Enterprise Security Management (ESM)™. This integration allows users to combine validated Threat Intelligence in ThreatConnect with their aggregated internal logs from ArcSight ESM. Users can easily spot trends or patterns that are out of the ordinary and act […]

Project CameraShy Closing The Aperture On China’s Unit 78020
ThreatConnect Platform

Project CameraShy Closing The Aperture On China’s Unit 78020

China is aggressively claiming territory deeper into the South China Sea, threatening economic and political stability in the Southeast Asia and beyond. The territorial activity is accompanied by high-tempo cyber espionage and malware attacks, malicious attachments and spear phishing, directed at Southeast Asian military, diplomatic, and economic targets. ThreatConnect®, in partnership with Defense Group Inc., […]

ThreatConnect and Crowdstrike Falcon Host
Threat Intelligence Operations

ThreatConnect and Crowdstrike Falcon Host

Through an expanded partnership with CrowdStrike, ThreatConnect® users can now act on intelligence in CrowdStrike Falcon Host. This integration allows users to discover and investigate both current and historic endpoint activity within seconds of ThreatConnect sending an indicator to CrowdStrike Falcon Host.

The Diamond Model for Intrusion Analysis
ThreatConnect Platform

The Diamond Model for Intrusion Analysis

“The Diamond Model for Intrusion Analysis” is the product of years worth of research and development by expert security analysts working on some of the toughest cyber security problems.  Informally, it is a cognitive model that presents a framework upon which to discover new activity, maximize analytic pivot opportunities, correlate and synthesize new information, and […]

ThreatConnect and Qualys Vulnerability Management Solution
Security Operations

ThreatConnect and Qualys Vulnerability Management Solution

The ThreatConnect and Qualys Vulnerability Management (VM) integration allows users to query Qualys scan results from within the ThreatConnect platform. Creates tasks, indicators, and attributes in ThreatConnect based on matching results automatically. Shows which machines are vulnerable to specific indicators, so one can pinpoint exactly where to take action. Together, ThreatConnect® and Qualys enable data-driven […]

ThreatConnect Palo Alto Networks Integration
Threat Intelligence Operations

ThreatConnect Palo Alto Networks Integration

ThreatConnect and Palo Alto Networks® have established a partnership to deliver validated threat intelligence to Palo Alto Networks next-generation firewalls, enabling security operations (SOC) teams to proactively protect their network from today’s sophisticated attacks. The joint solution ensures that customers can prioritize which threats are relevant to their organization. ThreatConnect threat intelligence provides the relevant […]