Quantcast
Channel: ThreatConnect - Threat Intelligence
Browsing latest articles
Browse All 32 View Live

Image may be NSFW.
Clik here to view.

Adversary Intelligence: Getting Behind the Keyboard

Arguably one of the most controversial subjects in Threat Intelligence currently is the topic of Attribution, or developing Adversary Intelligence. Industry pundits will debate attribution with a...

View Article


Image may be NSFW.
Clik here to view.

OPM Breach Analysis

Back in February, the ThreatConnect team conducted in-depth independent analysis of the Anthem breach, finding connections to amorphous Chinese APT activity. Although our primary concern at the time...

View Article


Image may be NSFW.
Clik here to view.

OPM Breach Analysis: Update

As highlighted in our recent webinar with Rick Holland, when there is a security event of great magnitude, organizational leadership will want to know as much as possible about the technical WHAT and...

View Article

Image may be NSFW.
Clik here to view.

Threat Intelligence and Risk Management: An Introduction

Several of us at ThreatConnect attended the Gartner Security & Risk Management Summit last week, which, conveniently took place right across the river from our home offices. I’m not sure if it’s...

View Article

Image may be NSFW.
Clik here to view.

Threat Intelligence within the Risk Management Process

This is the second post in a series exploring the relationship of threat intelligence and risk management. If you missed the previous one, wherein I briefly explained why these two should “swipe right”...

View Article

Browsing latest articles
Browse All 32 View Live