by Nir Yosha | Jan 30, 2018 | Blog, Cybersecurity
Waking up to Critical Infrastructure Threats POSTED BY NIR YOSHA “Without change, something sleeps inside us, and seldom awakens. The sleeper must awaken.” This quote from Dune is one of my favorites because it speaks so well to the phenomenon we see around cyber...
by Liz Bush | Jan 26, 2018 | Media Coverage
Over the next five years, the threat intelligence market is predicted to grow more than 18% a year and reach nearly $9 billion by 2022. This growth is largely fueled by a fact we’ve all come to live with: we can’t block every attack. Threat intelligence allows us to...
by Liz Bush | Jan 23, 2018 | Blog, Threat Intelligence
How ThreatQ Helps SOCs Streamline Tasks to Focus on Higher Priority Threats POSTED BY LIZ BUSH Alexander Graham Bell said, “Before anything else, preparation is the key to success.” Intellectually and in our gut, we all know this is true. The problem is that...
by Jonathan Couch | Jan 17, 2018 | Blog, Threat Intelligence
Attribution – One size doesn’t fit all POSTED BY JONATHAN COUCH When you’re a victim of a crime it’s human nature to want to know who is responsible. You call and report it. The police come. They conduct an investigation. And hopefully they can track down the guilty...
by Neal Humphrey | Jan 10, 2018 | Blog, Threat Intelligence
What does a truly Flexible Threat Intelligence Platform look like? POSTED BY NEAL HUMPHREY The ThreatQ Fantasy Football Use CaseWorking in a new market is always an interesting experience. I am reminded of this every time I go out to a trade show and quickly get the...