Skip to main content

Explore Featured Resources

Showing 287 resources items
Sort

No Results Match Your Search

Please try again or contact marketing@threatconnect.com for more information on our resources.

ThreatConnect Powered by SAP HANA
Security Operations

ThreatConnect Powered by SAP HANA

The latest edition of the ThreatConnect platform is built on SAP’s ground-breaking in-memory computing technology to enable you to move at the same speed as your adversary. It has the same robust features analysts, SOCs, and IR teams depend on, only accelerated: delivering actionable insight from massive volumes of threat data faster, more comprehensively, and more […]

Threat Intelligence Operations

Financial Services Sees Success with Smarter Threat Intelligence

We’ll examine one global financial services organization’s set-up and continued success with using the integration, and attendees will walk away with a new tool in their arsenal to effectively analyze and defend their networks using sophisticated threat intelligence.

Threat Intelligence Operations

Data-Driven Threat Intelligence: Metrics on Indicators, Dissemination and Sharing

Join Bhaskar Karambelkar, Data Science Lead at ThreatConnect, and Alex Sieira, CTO of Niddel and a principal at MLSec Project, as they review aggregated usage information from intelligence sharing communities to better understand what a “healthy” threat intelligence sharing community looks like and how a powerful threat intelligence platform (TIP) can be used to leverage this […]

Maturing a Threat Intelligence Program
Threat Intelligence Operations

Maturing a Threat Intelligence Program

A mature threat intelligence program is essential for effective cybersecurity, but adoption and maturity levels vary widely across organizations. While some have heavily invested in tools, processes, and personnel, most are still developing their capabilities. Advancing maturity isn’t just about spending more; it requires strategic investments in analyst time, appropriate solutions, and strong collaboration with […]

SIEM + Threat Intelligence: Quickly Identify the Threats that Matter to You
Threat Intelligence Operations

SIEM + Threat Intelligence: Quickly Identify the Threats that Matter to You

This white paper will examine how security organizations can enhance their SIEM with threat intelligence to take control of the chaos, gain a fuller understanding of threats, eliminate false positives, and form a proactive, intelligence-driven defense.

Fidelis Cybersecurity Joint Solution Brief
Incident Response

Fidelis Cybersecurity Joint Solution Brief

ThreatConnect® and Fidelis Cybersecurity have partnered to provide users with ThreatConnect intelligence for use within Fidelis Network™. This integration allows automatic synchronization of ThreatConnect indicators to Fidelis Network, enabling users to easily – and quickly – investigate current and historic network activity for the latest threats.

From Reactive to Proactive: How to Avoid Alert Fatigue
Security Operations

From Reactive to Proactive: How to Avoid Alert Fatigue

Alert fatigue. As cybersecurity teams and technologies get better at detecting threats, they are also becoming more inundated with alerts, warnings, and notifications. As a result, IT and cybersecurity professionals become desensitized to alerts, and may be less inclined to address them. Find out how to take decisive action on the threats that are most […]

ThreatConnect McAfee Enterprise Security Manager Integration
Threat Intelligence Operations

ThreatConnect McAfee Enterprise Security Manager Integration

ThreatConnect™ and McAfee® have partnered to enable users to detect and act on ThreatConnect intelligence in McAfee Enterprise Security Manager™. This integration allows users to combine validated Threat Intelligence in ThreatConnect with their aggregated internal logs from McAfee ESM. Users can spot trends or patterns that are out of the ordinary and act on them […]

ThreatConnect and Accenture DeepSight Intelligence
Threat Intelligence Operations

ThreatConnect and Accenture DeepSight Intelligence

The new ThreatConnect® and Accenture integration enables users to collect and act on Accenture™ Cyber Security Services: DeepSight Intelligence in the ThreatConnect platform. This partnership allows users to ingest DeepSight Intelligence Advanced IP and URL Reputation feeds into ThreatConnect, so they can act on this intelligence in their network.

Fragmentation: The “Silent Killer” of Your Security Management Program
Security Operations

Fragmentation: The “Silent Killer” of Your Security Management Program

Extreme fragmentation of enterprise security people, processes, and technologies is contributing to the “Detection Deficit” between attackers and defenders reaching an all-time high and trending wider. In this paper we’ll take a look at the issues and lay out a path toward better security through better unity.

Threat Intelligence Operations

ThreatConnect Overview and DomainTools Integration

Using DomainTools’ branded Reverse Whois and Registrant Alert services in ThreatConnect’s Track feature, ThreatConnect customers are able to research malicious domain registrants from the industry’s longest running and most comprehensive searchable database of domain name registration and hosting data. DomainTools and ThreatConnect offer users the best DNS based threat intelligence capability on the market.

Applying Threat Intelligence to the Star Wars’ Battle of Yavin
Threat Intelligence Operations

Applying Threat Intelligence to the Star Wars’ Battle of Yavin

If the Empire had been able to make sense of the intelligence they were gathering and had been able to connect the dots to reveal contextual information, they could have prevented their own demise, and stopped a decades-long saga from unfolding.