Follow ThreatConnect on their other social channels!
About Us
Company Size:
51-200 employees
Company Type:
Arlington, VA
ThreatConnect® enables organizations to identify, manage, and block threats with threat intelligence, automation, and orchestration. Providing security teams a platform to unite their people, processes, and technologies behind an intelligence-driven defense, ThreatConnect helps increase visibility ...
Read more
Promoted Content
Smarter = Faster: Security Orchestration with Threat Intelligence
Casting a Light on BlackEnergy
A look into BlackEnergy malware and using ThreatConnect to aggregate and memorialize the identified intelligence. As workers prepared to head home on December 23, 2015, an attack against Ukraine's energy sector left 230,000 without electricity (or heat) for six hours. The attackers demonstrated a variety of capabilities, including spearphishing emails and variants of the BlackEnergy 3 malware to gain a foothold into the Information Technology (IT) networks of the electricity companies. The Dec ...
Track to the Future
How to use historical intelligence to get back to the future and defend your organization   We need to talk about something. In the history of the ThreatConnect blog, we've never discussed Back to the Future. It's crazy to think that that's the case as arguably the second-greatest sci-fi trilogy is rife with quotable lines and meme-able scenes that would make for amazing blog fodder. We have to say that we love the Back to the Future trilogy. Despite it essentially being the same mo ...
Enterprise Defense at the Speed of Data
A joint whitepaper by SAP, Deloitte, and ThreatConnectToday’s threats are relentless. Cyberattacks are often multi-year campaigns targeting valuable, sensitive data and have many business implications — brand reputation, lost revenue, and more. In this paper, we discuss how an intelligence-driven security program gives your company or agency a fighting chance to stay ahead of ever-changing threats.Read the white paper
Mitigate Threats Faster with an Intelligence-Driven Defense
Learn to identify, manage, and block threats faster with intelligence.The ThreatConnect Platform was specifically designed to help you understand adversaries, automate workflows, and mitigate threats faster using threat intelligence. But we know security operations and threat intelligence are not one size fits all. That’s why we have options.View this recorded webinar to learn how our recently announced suite of products can help you mitigate threats faster. We’ll show you:The products: ...
Building an Intelligent SOC
Follow along with Gartner Analyst Oliver Rochford and ThreatConnect CEO Adam Vincent as they detail how to build an intelligent SOC. Learn why the traditional SOC is failing and what changes are needed to bring intelligence, automation, and adaptability to your security operations.Watch this webinar to learn:Why the traditional SOC is failingThe 5 characteristics of an intelligence-driven SOCHow to understand and plan for your security needsWatch this Webinar Now!Ol ...
Fragmentation: The “Silent Killer” of Your Security Management Program
Fragmentation is the silent killer of your security program. Sounds serious, right? Well, it is. After more than a decade of research, innovation, and investment in the cybersecurity industry, the “Detection Deficit” between attackers and defenders is near an all-time high and trending wider. While many contributory factors exist, extreme fragmentation of enterprise security people, processes, and technologies is surely chief among them. In this paper we’ll take a look at the issues and la ...
From Reactive to Proactive: How to Avoid Alert Fatigue
Take decisive action on the threats that are most critical and relevant to your organization. Alert fatigue. As cybersecurity teams and technologies get better at detecting threats, they are also becoming more inundated with alerts, warnings, and notifications. As a result, IT and cybersecurity professionals become desensitized to alerts, and may be less inclined to address them.
SIEM + Threat Intelligence: Quickly Identify the Threats that Matter to You
Security Information and Event Management (SIEM) systems are among the most versatile tools available for empowering your security organization. You might even say that they’re the one security tool you can’t live without. And, for many applications, you’re right. Yet, despite their many benefits, SIEMs are only as useful as the information you put in them. Inundate them with un-validated, raw threat data and the outcome is not pretty. In the face of hundreds, if not thousands of false pos ...
6 Easy Ways to Advance Your Cybersecurity Program When You Have a Small Team
When You Lack People, You Have to Rely on the Process, or Better Yet, a Platform for Rapid Detection and Response.Protecting your organization from threats is an ever-expanding and complicated process that requires an enormous amount of work. Even though the frequency and severity of breaches are rising, many organizations still rely on a small team of talented individuals to protect their organizations from attacks. These unsung heroes of cybersecurity cover many job functions and work very lon ...
Project Camerashy: Closing the Aperture on China’s Unit 78020
ThreatConnect®, in partnership with Defense Group Inc., has attributed cyber espionage activity associated with the Naikon Advanced Persistent Threat (APT) group to a specific unit (Unit 78020) within the Chinese People’s Liberation Army (PLA). For nearly five years, Unit 78020 has employed malicious email attachments and spear phishing campaigns to exploit its targets in the Southeast Asian military, diplomatic, and economic sectors. These targets include government entities in Cambodia, Ind ...

Our Revolution

We believe Cyber Security training should be free, for everyone, FOREVER. Everyone, everywhere, deserves the OPPORTUNITY to learn, begin and grow a career in this fascinating field. Therefore, Cybrary is a free community where people, companies and training come together to give everyone the ability to collaborate in an open source way that is revolutionizing the cyber security educational experience.

Cybrary On The Go

Get the Cybrary app for Android for online and offline viewing of our lessons.

Get it on Google Play

Support Cybrary

Donate Here to Get This Month's Donor Badge

Skip to toolbar

We recommend always using caution when following any link

Are you sure you want to continue?