Skip to main content

Explore Featured Resources

Showing 292 resources items
Sort

No Results Match Your Search

Please try again or contact marketing@threatconnect.com for more information on our resources.

Cyber Risk Quantification

State of RQ: A Practitioner View Webinar

Hear from industry experts and practitioners who have been in the trenches building Risk Quantification programs. See where the CRQ industry is going, what challenges they have faced, how to overcome them, and what CRQ vendors can do to help.

Smarter Security – Introducing Matt Scheurer, Assistant CSIRT VP and ThreatReel Host
Incident Response Threat Intelligence Operations

Smarter Security – Introducing Matt Scheurer, Assistant CSIRT VP and ThreatReel Host

In this insightful interview, Matt Scheurer and Lara Meadows discuss the evolving landscape of digital forensics, offensive security, and the ever-changing realm of cybersecurity operations. The conversation delves into the complex nature of modern security threats, from the impact of cloud technology on security principles to the challenges of analyzing phishing emails in a cloud-based […]

Unlocking the Potential of Cyber Risk Quantification: A Guide to Navigating SEC Cybersecurity Regulations
Cyber Risk Quantification

Unlocking the Potential of Cyber Risk Quantification: A Guide to Navigating SEC Cybersecurity Regulations

In an era where cybersecurity threats loom larger than ever, the Securities and Exchange Commission (SEC) has introduced stringent cybersecurity rules to enhance transparency and risk management among public companies. This whitepaper dives deep into the heart of these regulations, spotlighting the four-business-day notification requirement and the complex challenge of defining materiality. Discover how Cyber […]

Use Cases and Quick Wins for Offensive Security and Vulnerability Management
Polarity

Use Cases and Quick Wins for Offensive Security and Vulnerability Management

Enhance offensive security and vulnerability management with Polarity. Streamline triage, assessment, and execution with real-time insights for smarter, faster decisions.

Supporting Closed Network Deployments
Polarity

Supporting Closed Network Deployments

Transform your security operations with Polarity. Gain real-time intelligence, automated data integration, and actionable insights for closed network environments.

Enhance Your Defense with ThreatConnect’s Unified Threat Library
Threat Intelligence Operations ThreatConnect Platform

Enhance Your Defense with ThreatConnect’s Unified Threat Library

Establish a Single Source of Truth to Operationalize your Threat Intelligence Leverage the ThreatConnect Platform to ingest real-time data from a wide range of threat intelligence sources into a single repository and automatically aggregate, correlate, enrich, and operationalize the data so your Threat Intel Ops and Security Operations teams get the highest fidelity intelligence to […]

Empower The ThreatConnect Buyer’s Guide for Threat Intelligence Operations
Threat Intelligence Operations

Empower The ThreatConnect Buyer’s Guide for Threat Intelligence Operations

Discover a roadmap to cybersecurity excellence with The ThreatConnect Buyer’s Guide for Threat Intelligence Operations. Tailored for cybersecurity leaders, strategists, architects, and analysts, this infographic is your key to enhancing organizational security and risk posture through effective cyber CTI utilization. Explore the infographic today! Also, check out the full comprehensive ThreatConnect Buyer’s Guide For Threat […]

Choosing the Right Platform for Threat Intelligence E-Book
Threat Intelligence Operations

Choosing the Right Platform for Threat Intelligence E-Book

In an ever-evolving cyber landscape, staying ahead of threats is crucial. Our latest e-book, “Choosing the Right Platform for Threat Intelligence,” is designed to arm you with the knowledge needed to select the right threat intelligence platform for your organization. From Threat Intel Service providers to modern Threat Intel Operations platforms, the e-book explores various […]

State Government and Intelligence-Powered Operations
Threat Intelligence Operations ThreatConnect Platform

State Government and Intelligence-Powered Operations

This State Government initiated efforts to enhance the threat intelligence community and collaboration statewide. However, they faced challenges with member adoption and uncontextualized threat data, resulting in false positives and inefficiency. To address these issues, their Cyber Threat Intelligence team sought a solution that could automate and operationalize their threat intelligence processes at scale. They […]

Cyber Risk Quantification

Expert Panel Webinar: Cyber Risk Quantification in the Real World

Watch this expert panel for a practical discussion of real-world use cases for CRQ. You’ll learn how real organizations leverage CRQ to meet SEC guidelines for risk reporting and integrate cyber risk with an overall enterprise risk management program.

Combining the Power of Polarity & Mandiant
Polarity

Combining the Power of Polarity & Mandiant

Join our webinar with cybersecurity experts to explore the integration of Mandiant Threat Intelligence with Polarity. Learn threat intelligence basics, Mandiant’s offerings, real-time threat detection, and customer insights for enhanced cybersecurity strategies.

Energy and Utilities Organization Achieves Higher Efficiency and Better Cyber Defense With One Platform
Threat Intelligence Operations ThreatConnect Platform

Energy and Utilities Organization Achieves Higher Efficiency and Better Cyber Defense With One Platform

This large Energy and Utilities organization was struggling with outdated threat intelligence processes – relying heavily on manual aggregation and ad-hoc collaboration. They struggled with prioritizing threats, keeping cybersecurity spend within budget, responding effectively and efficiently, and generating actionable intelligence. Implementing The ThreatConnect TI Ops Platform revolutionized how this organization leveraged threat intelligence to improve […]