We’ve expanded our partnership with Mandiant, now part of Google Cloud, to help our users operationalize and prioritize threat intelligence. READ THE PRESS RELEASE >

Accelerate SOC Maturity with Threat Hunting

Accelerate SOC Maturity with Threat Hunting

Table of Contents: What Is SOC Maturity? Why Is It Important? What Does a Mature SOC Look Like? What Holds Organizations Back from Threat Hunting? Threat Hunting Benefits: Why Is Threat Hunting Important for SOC Maturity? What Is SOC Maturity? Why Is It Important? SOC leaders who got their start in security 10 or 20 […]

SnapAttack Expands Partnership with Mandiant to Modernize Cybersecurity through Operationalized Threat Intelligence

SnapAttack Expands Partnership with Mandiant to Modernize Cybersecurity through Operationalized Threat Intelligence

[Arlington, VA, November 8th, 2023] — SnapAttack, a centralized platform pioneering threat hunting, detection engineering, and threat intelligence, is delighted to announce an expanded partnership with Mandiant, part of Google Cloud, to extend operationalized threat intelligence to organizations of all sizes. Building on its current API integrations, the new endeavor will bring Mandiant’s industry-leading threat […]

Modernizing Threat Intelligence with TTPs: Not Your Father’s Threat Intelligence Pt. 1

Modernizing Threat Intelligence with TTPs

TL;DR: Think differently about threat intelligence with TTPs.Traditional approaches to threat intelligence leave security teams reactive, overwhelmed, and unable to quickly and proactively address threats. Operationalizing TTP-based intelligence carries some challenges, but the juice is well worth the squeeze. Table of Contents: All About the Pyramid of Pain Traditional Threat Intelligence: IOCs and Finished Intelligence […]

Mandiant Threat Intelligence & SnapAttack for Enterprises, a Better Together Story: Enhancing Your Detection Engineering Workflows

Mandiant Threat Intelligence & SnapAttack for Enterprises

Detection engineering is the process of creating, testing, deploying, and maintaining detections that alert security teams to malicious activity in their environment. Detection engineering is a critical component of a threat-informed defense, which is a proactive approach to cybersecurity leveraging threat intelligence, attack emulation, and behavioral analytics to improve security posture and reduce risk. However, […]

What’s Holding You Back? A CISO’s Perspective on Proactive Security

What’s Holding You Back? A CISO’s Perspective on Proactive Security

Paul Caiazzo, former CISOand current Chief Growth Officer at SnapAttack Linkedin Table of Contents: What is Proactive Cybersecurity? Benefits of Proactive Security What Holds Organizations Back From Being Proactive? How Can Organizations Enhance Cyber Maturity and Achieve Proactive Cybersecurity? Everyone wants to achieve “proactive security” right now. There’s not a tool on the market that […]

SnapAttack’s Threat Hunter’s Workbench: Revolutionizing Cybersecurity with Advanced Threat Hunting and Detection

Threat Hunter's Workbench

In today’s rapidly evolving digital landscape, the battle between cyber attackers and defenders has reached new heights. Cyber threats have become more sophisticated, targeting organizations of all sizes and industries. To stay ahead of these threats, organizations require innovative and powerful cybersecurity solutions that empower their security operations teams to proactively hunt down and detect […]

Continuous Threat Exposure Management (CTEM): A Proactive Cybersecurity Model

CTEM Gartner reprint

At any given moment on any given day, are you able to confidently answer the question, “Are we protected?” If you’re testing your security controls any less often than every single day, the answer to that question is a hard – and stressful – “no”. In the history of human technology, we’ve never had access […]

What is Purple Teaming?

What Is Purple Teaming?

Traditionally, red and blue teams work in silos, guided by competing goals. While the red team conducts offensive drills like pen tests and ethical hacking, the blue team strengthens defenses and responds to incidents. Because of this divide, red and blue teams have developed a naturally adversarial dynamic – but when the two work together, […]