by Ryan Trost | Feb 27, 2017 | Blog, Threat Intelligence
Scoring: "Trust but Verify" POSTED BY RYAN TROST Every security provider publishes a risk score…BUT NOT US! Instead of adding to the data noise – we allow teams to be more efficient with scores! A lot of consumers of intelligence take vendor scores at face value but...
by Ryan Trost | Feb 23, 2017 | Blog, Threat Intelligence
Aging Intelligence Tier II – Maturing Deprecation & Scoring POSTED BY RYAN TROST The next evolution of deprecation and scoring is developing several advanced “aging” algorithms. This provides analysts the next phase of control to be applied to their intelligence...
by Ryan Trost | Feb 23, 2017 | Blog, Threat Intelligence
Aging Intelligence Tier II – Maturing Deprecation & Scoring POSTED BY RYAN TROST The next evolution of deprecation and scoring is developing several advanced “aging” algorithms. This provides analysts the next phase of control to be applied to their intelligence...
by Kevin Libby | Feb 21, 2017 | Blog, Cybersecurity
I want more “Stuff.” POSTED BY KEVIN LIBBY “Everybody’s gotta have a little place for their stuff. That’s all life is about. Trying to find a place for your stuff.” — George CarlinAmong some of the more memorable nuggets from George Carlin that fed my...
by Julian DeFronzo | Feb 13, 2017 | Blog, Corporate, Threat Intelligence
ThreatQ and Phantom: Injecting Contextual Threat Intel into Security Automation and Orchestration POSTED BY JULIAN DEFRONZO The emergence of automation and orchestration tools in the security space has helped enhance security analyst and incident response workflows....