The Arlington, Va.-based security firm ThreatConnect, Inc., which created the Threat Intelligence Platform as its flagship product, announced the release of TC Exchange, a service that allows users to build, host and share customized apps for leveraging integrations, workflows and analytics that help offset cyberattacks.
ThreatConnect, which delivers a single platform both in the cloud and on-premises to thwart cyberattacks, allows organizations to freely share codes with one another through TC Exchange and its software development kit. Users can also choose and modify applications, and accelerate solution development through plug-and-play activities.
By incorporating application development, ThreatConnect said it believes organizations can spend more time analyzing and less time programming, while plugging all of their systems and processes into one platform, which in turn makes it easy to control and maintain data.
ThreatConnect plans to create and launch applications built by its internal team in conjunction with its partners. These include apps for integrations, workflows and analytics, and some initial apps will enable workflows for malware analysis and triage. Others will focus on auto-tasking indicators based on criticality and confidence thresholds, and indicator enrichment.
“ThreatConnect has the only true Threat Intelligence Platform on the market today, and this new offering brings a value-added extension to the platform's capabilities,” Adam Vincent, CEO of ThreatConnect, said. “So much of the debate around the value of threat intelligence and, similarly, threat intelligence platforms comes from a lack of understanding. When you fully understand what a platform should be, you will see the limitless potential of threat intelligence to shape decisions across all levels of the enterprise.”
TC Exchange, the software development kit and new applications will roll out during the third quarter of 2015.
The ability to assess threats is sure to come in handy, as this week US-CERT, part of DHS' National Cybersecurity and Communications Integration Center, reported multiple alerts.
Recently disclosed vulnerabilities in Adobe Flash and Microsoft Windows may allow a remote attacker to execute arbitrary code with system privileges. Since attackers continue to target and find new vulnerabilities in popular, Internet-facing software, updating is not sufficient – it's important to use defensive techniques such as mitigating exploits, experts have warned.
Adobe has released a security update to address critical vulnerabilities in Shockwave Player for Windows and Macintosh, and in addition, Oracle released security fixes to address 193 vulnerabilities as part of its quarterly Critical Patch Update. Exploitation of these vulnerabilities could allow an attacker to take control of an affected system.
Complete your profile to continue reading and get FREE access to CUTimes.com, part of your ALM digital membership.
Your access to unlimited CUTimes.com content isn’t changing.
Once you are an ALM digital member, you’ll receive:
- Breaking credit union news and analysis, on-site and via our newsletters and custom alerts
- Weekly Shared Accounts podcast featuring exclusive interviews with industry leaders
- Educational webcasts, white papers, and ebooks from industry thought leaders
- Critical coverage of the commercial real estate and financial advisory markets on our other ALM sites, GlobeSt.com and ThinkAdvisor.com
Already have an account? Sign In Now
© 2024 ALM Global, LLC, All Rights Reserved. Request academic re-use from www.copyright.com. All other uses, submit a request to [email protected]. For more information visit Asset & Logo Licensing.