ThreatConnect
Follow
600 Followers
Follow ThreatConnect on their other social channels!
About Us
Founded:
2011
Company Size:
51-200 employees
Company Type:
Private
Location:
Arlington, VA
Website:
ThreatConnect® enables organizations to identify, manage, and block threats with threat intelligence, automation, and orchestration. Providing security teams a platform to unite their people, processes, and technologies behind an intelligence-driven defense, ThreatConnect helps increase visibility ...
Read more
Promoted Content
[UPDATED] MATURING A THREAT INTELLIGENCE PROGRAM
Follow
639
Mitigate Threats Faster with an Intelligence-Driven Defense
Learn to identify, manage, and block threats faster with intelligence.The ThreatConnect Platform was specifically designed to help you understand adversaries, automate workflows, and mitigate threats faster using threat intelligence. But we know security operations and threat intelligence are not one size fits all. That’s why we have options.View this recorded webinar to learn how our recently announced suite of products can help you mitigate threats faster. We’ll show you:The products: ...
Follow
2508
Building an Intelligent SOC
Follow along with Gartner Analyst Oliver Rochford and ThreatConnect CEO Adam Vincent as they detail how to build an intelligent SOC. Learn why the traditional SOC is failing and what changes are needed to bring intelligence, automation, and adaptability to your security operations.Watch this webinar to learn:Why the traditional SOC is failingThe 5 characteristics of an intelligence-driven SOCHow to understand and plan for your security needsWatch this Webinar Now!Ol ...
Follow
667
Fragmentation: The “Silent Killer” of Your Security Management Program
Fragmentation is the silent killer of your security program. Sounds serious, right? Well, it is. After more than a decade of research, innovation, and investment in the cybersecurity industry, the “Detection Deficit” between attackers and defenders is near an all-time high and trending wider. While many contributory factors exist, extreme fragmentation of enterprise security people, processes, and technologies is surely chief among them. In this paper we’ll take a look at the issues and la ...
Follow
1252
From Reactive to Proactive: How to Avoid Alert Fatigue
Take decisive action on the threats that are most critical and relevant to your organization. Alert fatigue. As cybersecurity teams and technologies get better at detecting threats, they are also becoming more inundated with alerts, warnings, and notifications. As a result, IT and cybersecurity professionals become desensitized to alerts, and may be less inclined to address them.
Follow
368
SIEM + Threat Intelligence: Quickly Identify the Threats that Matter to You
Security Information and Event Management (SIEM) systems are among the most versatile tools available for empowering your security organization. You might even say that they’re the one security tool you can’t live without. And, for many applications, you’re right. Yet, despite their many benefits, SIEMs are only as useful as the information you put in them. Inundate them with un-validated, raw threat data and the outcome is not pretty. In the face of hundreds, if not thousands of false pos ...
Follow
714
6 Easy Ways to Advance Your Cybersecurity Program When You Have a Small Team
When You Lack People, You Have to Rely on the Process, or Better Yet, a Platform for Rapid Detection and Response.Protecting your organization from threats is an ever-expanding and complicated process that requires an enormous amount of work. Even though the frequency and severity of breaches are rising, many organizations still rely on a small team of talented individuals to protect their organizations from attacks. These unsung heroes of cybersecurity cover many job functions and work very lon ...
Follow
155
Project Camerashy: Closing the Aperture on China’s Unit 78020
ThreatConnect®, in partnership with Defense Group Inc., has attributed cyber espionage activity associated with the Naikon Advanced Persistent Threat (APT) group to a specific unit (Unit 78020) within the Chinese People’s Liberation Army (PLA). For nearly five years, Unit 78020 has employed malicious email attachments and spear phishing campaigns to exploit its targets in the Southeast Asian military, diplomatic, and economic sectors. These targets include government entities in Cambodia, Ind ...

Our Revolution

We believe Cyber Security training should be free, for everyone, FOREVER. Everyone, everywhere, deserves the OPPORTUNITY to learn, begin and grow a career in this fascinating field. Therefore, Cybrary is a free community where people, companies and training come together to give everyone the ability to collaborate in an open source way that is revolutionizing the cyber security educational experience.

Cybrary On The Go

Get the Cybrary app for Android for online and offline viewing of our lessons.

Get it on Google Play
 

Support Cybrary

Donate Here to Get This Month's Donor Badge

 

Cybrary|0P3N

Your Complete Guide to Hyper-V
Views: 2274 / June 24, 2017
What is Tabnapping? Protection & Prevention Techniques
Views: 3043 / June 23, 2017
Free Solution for OST to PST
Views: 2346 / June 22, 2017
UNM4SK3D: NSA
Views: 1928 / June 22, 2017
Skip to toolbar
Cybrary works best if you switch to our Android-friendly app
Continue

We recommend always using caution when following any link

Are you sure you want to continue?

Continue
Cancel