by Ryan Trost | Jan 29, 2019 | Blog, Cybersecurity, Threat Intelligence
Intelligent Consolidation Rules All - the Underbelly of Communities POSTED BY RYAN TROST As an analyst you are always subconsciously consolidating information looking for investigation patterns, trends, or even the slightest hint of an attacker bending RFC rules to...
by Anthony Perridge | Jan 23, 2019 | Blog, Cybersecurity, Threat Intelligence
Four cybersecurity challenges that critical infrastructures are facing POSTED BY ANTHONY PERRIDGE In 2018, Russia started a widespread cyber-attack targeting critical infrastructures around the world, including tens of thousands of devices in British homes. So back in...
by Marc Solomon | Jan 18, 2019 | Media Coverage
It’s that time of year for prediction articles and the number has become almost overwhelming. This year, one of the trending topics I’ve noticed is the growth in Internet of Things (IoT) and connected devices and an expected surge in cyber risks. Technology vendors,...
by Liz Bush | Jan 15, 2019 | Blog, Cybersecurity
How ThreatQ Works with Visualization Tools POSTED BY LIZ BUSH In this blog series, we’re focusing on how ThreatQ and ThreatQ Investigations augment and integrate with modern security tools and are able to replace legacy processes and systems. We accomplish this...
by Ryan Trost | Jan 8, 2019 | Blog, Cybersecurity, Threat Intelligence
Using Commercial Intel Feeds as a Warning Siren for Threat Hunting POSTED BY RYAN TROST Seems like Mitre’s ATT&CK framework is cyber bingo’s new “center square” and Marketing Teams across the globe are stretching to incorporate it into their upcoming RSA...