Skip to main content

Explore Featured Resources

Showing 291 resources items
Sort

No Results Match Your Search

Please try again or contact marketing@threatconnect.com for more information on our resources.

Sandboxing-Powered Threat Intelligence: Defending Against Stealer Malware
Security Operations Threat Intelligence Operations

Sandboxing-Powered Threat Intelligence: Defending Against Stealer Malware

Integrating ThreatConnect’s Threat Intelligence Platform with VMRay enhances security by providing detailed insights into malware and threat actors. This combination streamlines workflows, helping SOC analysts prioritize alerts and improve defenses like SIEM, XDR, EDR, and NDR. Join our on-demand webinar, hosted by ThreatConnect and VMRay, to: Explore an in-depth analysis of Redline and Lumma infostealers […]

Operationalizing Threat Hunting: A Comprehensive Guide
Polarity Threat Intelligence Operations

Operationalizing Threat Hunting: A Comprehensive Guide

This guide provides a clear framework for building or enhancing a structured, hypothesis-driven approach to threat hunting.

The Emerging Threat Playbook: Operationalizing Exploit Intelligence
Security Operations Threat Intelligence Operations

The Emerging Threat Playbook: Operationalizing Exploit Intelligence

Security analysts encounter significant challenges in managing threat intelligence and conducting vulnerability assessments, particularly as attackers swiftly exploit weaknesses. Watch our on-demand webinar hosted by ThreatConnect and VulnCheck where we offer valuable insights into strengthening cybersecurity strategies. Attend the webinar to learn about: Prioritizing high-risk vulnerabilities instantly with evidence of exploitation. Automating monitoring and getting […]

ThreatConnect CAL™ Integration with Polarity
Polarity

ThreatConnect CAL™ Integration with Polarity

CAL combines large datasets and analytics to discover actionable and timely insights for teams of all sizes and maturity levels.

Discover How Genuine Parts Company Transformed Their Cyber Risk Strategy
Cyber Risk Quantification

Discover How Genuine Parts Company Transformed Their Cyber Risk Strategy

Explore how GPC optimized their cybersecurity strategy using ThreatConnect’s Risk Quantifier, transitioning to data-driven analyses for better risk management and investment decisions.

Polarity Tour
Polarity

Polarity Tour

Explore an interactive tour of Polarity to see how it integrates into analysts’ workflows across apps and browsers. It automates search, aggregation, and correlation of contextual data in real-time from hundreds of federated data and knowledge sources into a unified display.

ThreatConnect Platform Tour
ThreatConnect Platform

ThreatConnect Platform Tour

Explore the ThreatConnect Platform with this interactive tour. You can navigate through our platform overview plus dive into our capabilities, including Intelligence Requirements, ATT&CK Visualizer, Threat Graph, Playbook Automation, Built-in Reporting, CAL™ Feeds and Automated Threat Library, and Workflows, Tasks, and Cases.

Polarity Intel Edition: Real-Time Threat Intelligence for Your Security Operations Webinar
Polarity

Polarity Intel Edition: Real-Time Threat Intelligence for Your Security Operations Webinar

Watch this insightful on-demand webinar as we dive into the newly launched Polarity Intel Edition (PIE) and explore how it makes it easier for teams to disseminate and use threat intelligence. In this session, Dan Cole, VP of Product Marketing, and Joe Miller, Director of Product, will walk you through the key capabilities of PIE, showcasing how it integrates with ThreatConnect’s TI Ops platform to deliver real-time, contextual intelligence across your security tools.

ThreatConnect Risk Quantifier Tour
Cyber Risk Quantification

ThreatConnect Risk Quantifier Tour

Explore our cyber risk quantification tour to prioritize security investments and defensive actions by focusing on the greatest risks to your business.

Maximizing Internal Intelligence for Defense Enablement Webinar
Polarity

Maximizing Internal Intelligence for Defense Enablement Webinar

Watch this on-demand webinar with Paul Battista, CEO and co-founder of Polarity.io to learn how to harness internal intelligence more effectively, analyze threat intel faster, and increase team efficiency without additional resources.

Polarity Intel Edition by ThreatConnect
Polarity

Polarity Intel Edition by ThreatConnect

Streamline threat intel workflows and provide real-time contextual information for SecOps and CTI teams.

ThreatConnect TI Ops and Polarity Solution Brief
Polarity

ThreatConnect TI Ops and Polarity Solution Brief

ThreatConnect and Polarity offer an integrated solution for real-time access to aggregated and correlated threat intel and context, enhancing the efficiency and decision-making confidence of security operations and threat intel teams.