Tech Library is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them. Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.



Access the latest white papers, research webcasts, case studies and more covering a wide range of topics like Mobile, Cloud and Data Analyitcs. Filter the library by ...


Building a Threat Intelligence Program: Research Findings on Best Practices and Impact

by ThreatConnectSep 13, 2019

We surveyed over 350 cybersecurity decision makers about their services, products, and methods. This resulting report found that organizations that are leveraging threat intelligence to combat increasing cyber threats have seen a large business impact. In fact, organizations credit threat intelligence programs with saving businesses an average of $8.8 million over twelve months.

SOAR Platforms: Everything You Need to Know About Security, Orchestration, Automation, and Response

by ThreatConnectSep 13, 2019

With a SOAR solution, it's possible to process data and mitigate threats in a single platform. You'll also learn how you can adapt to the adversarial landscape and use automation and orchestration to streamline your organization's security approach.

Threat Intelligence Platforms: Everything You Want to Know, But Didn't Know to Ask

by ThreatConnectSep 13, 2019

Download this ebook to learn how a Threat Intelligence Platform (TIP) can help your organization move faster, collaborate more intently, and make better use of existing tools to aggregate, analyze, and act on threat intelligence. This book also talks about how to effectively use threat intelligence, expected capabilities of a TIP, the future of threat intel, and more. Read to the very end for a TIP checklist.

Open Source vs. Commercial Threat Intelligence Platforms

by ThreatConnectSep 13, 2019

In this whitepaper, we discuss the key technical and economic considerations every security team needs when contemplating an open source or commercial threat intelligence platform. It will help you narrow down what your team needs and what solution best fits your cybersecurity strategy.

More is Not More: Busting the Threat Intel Myth

by ThreatConnectSep 13, 2019

It's a common misconception that a large quantity of threat intelligence feeds leads to more effective security. But instead of adding more threat intel feeds, you should incorporate the feeds that provide the most value to your organization's security operations. Download this paper to learn your options when it comes to threat intel feeds; how to evaluate feeds' quality; and which are the right feeds for your organization.

Build Your Own SOC or Partner with an MSSP

by BlueVoyantSep 12, 2019

Underprotected companies offer the path of least resistance and the quickest return on investment for a cyberattack. Regardless of company size, the financial risks demand an effective, efficient, and high-end SOC to protect their businesses. In this treacherous environment, organizations need to dramatically improve their security posture. Management must weigh the costs and benefits of building, staffing, and managing their own SOC, or partnering with an MSSP. When making this decision, it is

Quick Guide to Calculating the Cost of Ransomware

by BlueVoyantSep 12, 2019

In today's threat landscape, organizations need to proactively determine what they are going to do; Pay, Not Pay, or Defend. An important place to start is calculating the financial risks of ransomware. The math is straightforward. The calculations presented in this whitepaper can be used as a starting point. They can be used to facilitate conversations between Security Teams, Business Owners, IT Teams and Senior Management. They can be used to drive more effective security strategies and

9 Ways Cybercriminals Disrupt Business Operations

by BlueVoyantSep 12, 2019

The cyber battlefield has evolved and become much more complex. For businesses and governments, the fear of a global cyberattack is no longer an abstract thought; it is a stark reality. Businesses face the challenge of protecting their systems and operations from threat actors with sophisticated techniques, tactics, and procedures that are capable of launching a devastating cyberattack. It is essential that companies become more proactive and predictive in mitigating risk. To support businesses

Tales from the Dark Web

by BlueVoyantSep 12, 2019

Cybercriminals are well funded, organized, and increasingly sophisticated. They continue to leverage the deep and dark web to crowdsource the latest techniques and coordinate attacks. Today we see the lines between cyber organized crime and nation-state operations blurred. Mid-sized organizations are a very lucrative target for hackers. Few know this better than former CTO and Senior Special Agent of the FBI's Cyber Division, Milan Patel. Milan has seen those cyber attacks firsthand and has led

The Race is On: Stop Zero-Hour Phishing Attacks

by SlashNextApr 04, 2019

From mere minutes to the first user opens and clicks on malicious emails, attachments, and URLs, attackers hook virtually 100% of their phishing victims within the first 4 to 8 hours - by which time they have shut down 75% of their phishing URLs and moved on. With so much at stake based on this accelerating race against time, successful protection of your organization's email and websites against phishing attacks requires a high-speed, highly automated approach.

A recent Aberdeen report,



BlueVoyant is an analytics-driven cybersecurity company whose mission is to protect businesses of all sizes against agile and well-financed cyber attackers by providing unparalleled visibility, insight and responsiveness. BlueVoyant provides Advanced Threat Intelligence, Managed Security Services and Professional Services. The company is lead by a team of senior business executives and former government cyber leaders from Morgan Stanley, Thomson Reuters, NSA, FBI, GCHQ and Unit 8200. BlueVoyant has offices in the United States, Israel, the United Kingdom, Spain and the Philippines.


SlashNext is transforming how organizations protect themselves from next-gen phishing and social engineering threats. Founded by Atif Mushtaq, the former lead architect of FireEye's core malware detection system, SlashNext has pioneered the industry's most powerful and most accurate phishing site detection technology. SlashNext enables enterprises to close the gaps in their anti-phishing defenses and to automate analysis of suspicious URLs to expedite threat hunting and phishing incident response. With SlashNext, enterprises can dramatically reduce the risk of business email compromise (BEC), credential stealing, IP theft, breaches, and costly remediation efforts.


With cyber threats more prevalent, organizations are ramping up their security and threat intelligence programs. With ThreatConnect you can empower your security team with a threat intelligence platform that includes orchestration and automation that enable your team to speed through repetitive tasks and gain visibility into the threats attacking your organization. Whether you're easing your way into a cyber security practice, or well-versed in everything that will strengthen your organization, ThreatConnect has the resources to help you take the next step.