Skip to main content

Explore Featured Resources

Showing 291 resources items
Sort

No Results Match Your Search

Please try again or contact marketing@threatconnect.com for more information on our resources.

Operationalizing Intelligence Requirements: A Comprehensive Guide
Threat Intelligence Operations

Operationalizing Intelligence Requirements: A Comprehensive Guide

Enhance your cybersecurity with intelligent requirements and craft effective intelligence strategies. Stay ahead of cyber threats by adapting to an evolving landscape. Download the comprehensive guide here.

Buyer’s Guide for Threat Intelligence Operations
Threat Intelligence Operations ThreatConnect Platform

Buyer’s Guide for Threat Intelligence Operations

The ThreatConnect Buyer’s Guide for Threat Intelligence Operations is a comprehensive resource tailored for cybersecurity leaders, strategists, architects, and analysts seeking to enhance their organization’s security and risk posture by effectively utilizing cyber threat intelligence (CTI). 

ThreatConnect Platform

Streamline Your Cyber Threat Research with ThreatConnect Intelligence Requirement Webinar

Learn more about the importance of intelligence requirements and the impact they have on your threat intel org.

Smarter Security Series – Validating Geodata
Threat Intelligence Operations

Smarter Security Series – Validating Geodata

Explore the world of Geodata firsthand with Devin Somppi, VP of Cybersecurity at the Decisive Group, who will provide a fresh perspective on: What is GeoData and its challenges How to automate validation processes to determine GeoData accuracy A unique approach to increase efficiency with GeoData If your organization is wrestling with Geo Data, consider […]

Smarter Security Series – Expanding Threat Intelligence Into DevOps
Threat Intelligence Operations

Smarter Security Series – Expanding Threat Intelligence Into DevOps

Devin Somppi, VP of Cybersecurity at the Decisive Group, made some pretty interesting revelations on the intersection of technology and problem-solving practices that often go unattended in security operations. Devin and Lara Meadows, VP of Sales Engineering at ThreatConnect, pointed out that the most common phenomenon in these circles is the existence of forgotten scripts, […]

Polarity

Power of Polarity + Google

Learn how Polarity’s platform integrates with Google services to enhance cybersecurity. Discover integration use cases, essential tools like VirusTotal and Chronicle, and streamline your workflow with expert insights.

Smarter Security Series – Unified Alert Response: A Use Case for All Security Tools
Threat Intelligence Operations

Smarter Security Series – Unified Alert Response: A Use Case for All Security Tools

Devin Somppi, VP of Cybersecurity at the Decisive Group, applauds the excellent potential and capabilities of ThreatConnect. According to Devin, ThreatConnect aims to substantially alleviate analysts’ challenges by providing an intermediate layer across different security tools and facilitating swift pivoting. One of the more outstanding features The ThreatConnect Platform offers is its capacity to unify […]

Smarter Security Series: Driving Context around Endpoints to Automate Detection and Response
Threat Intelligence Operations

Smarter Security Series: Driving Context around Endpoints to Automate Detection and Response

Devin Somppi, VP of Cybersecurity at the Decisive Group, delves into XDR, or Extended Detection and Response, one of today’s biggest trends in cybersecurity. He emphasizes that there’s not a universal definition of XDR, highlighting it as a concept open to individual interpretation. For Devin, XDR signifies rich telemetry data that stems from endpoints, goes […]

ThreatConnect and SecurityScorecard
Cyber Risk Quantification

ThreatConnect and SecurityScorecard

ThreatConnect has partnered with SecurityScorecard for their Cyber Risk Quantification (CRQ) solution powered by ThreatConnect Risk Quantifier (RQ). Applying ThreatConnect’s statistical and machine learning algorithms to the Security Scorecard data enables customers to easily understand their risk, both external and internal, and more importantly prioritize which factors should be improved based on financial risk reductions. SecurityScorecard’s […]

Smarter Security Series – Leveraging Resources to Prioritize your Efforts
Threat Intelligence Operations

Smarter Security Series – Leveraging Resources to Prioritize your Efforts

Lara Meadows VP of Sales Engineering at ThreatConnect is joined by Devin Somppi, VP of Cybersecurity at Decisive Group where they discuss an issue many teams currently face – Prioritization. They also discuss: Difficulties in handling massive amounts of data How to automate repetitive tasks and build playbooks Importance of prioritization If you, like many […]

Smarter Security Series – The Putty That Fits Into All Your Security Tools
Threat Intelligence Operations

Smarter Security Series – The Putty That Fits Into All Your Security Tools

Lara Meadows, VP of Sales Engineering at ThreatConnect, brought to light some significant issues that revolve around key integrations when dealing with clients and building their systems. In her discussion with Devin Somppi, VP of Cybersecurity at Decisive Group, they unravel numerous intriguing elements. Devin paints a picture of the infinite possibilities offered through integrations […]

Smarter Security Series – Fail Fast Fail Hard in Incident Response
Threat Intelligence Operations

Smarter Security Series – Fail Fast Fail Hard in Incident Response

In this video, Devin Somppi, VP of Cybersecurity at Decisive Group, dives into one of the evolving trends in cybersecurity: The Transformation of Incident Response with Lara Meadows, VP of Sales Engineering at ThreatConnect. Traditionally, incident response teams have been perceived as tactical tiger teams, readily deployed to handle burgeoning crises. However, Devin enlightens us […]