by Liz Bush | Mar 26, 2019 | Blog, Cybersecurity, Threat Intelligence
The MITRE ATT&CK Framework – A Sign of the Times POSTED BY LIZ BUSH There was a time when we believed that we could prevent every attack. But despite a defense-in-depth strategy, as the years progressed we realized this wasn’t possible. Attacks are happening with...
by Marc Solomon | Mar 25, 2019 | Media Coverage
From Ferdinand Magellan to Lewis and Clark to Neil Armstrong – humans have an innate desire to understand the unknown. In security operations, we see this phenomenon every day in several forms, one of which is threat hunting. Threat hunting is not triggered by an...
by ThreatQ | Mar 22, 2019 | Media Coverage
Journal of Cyber Policy Hugh Taylor March 20, 2019 If you’re a parent, you may use the phrase, “Play nicely together!” as a threat to children who refuse to get along. In cyber security, it’s the other way around. The phrase might apply to threats themselves. “Play...
by Alison Adkins | Mar 21, 2019 | Blog, Cybersecurity
RSAC USA: Then and Now POSTED BY ALISON ADKINS From the first RSAC USA in 1991 to the latest conference wrapping up just two weeks ago, there have been many changes. Although US fashion trends from the early 90’s may have peaked, disappeared and resurfaced in 2019...
by Liz Bush | Mar 12, 2019 | Blog, Cybersecurity, Threat Intelligence
Spear Phishing Analysis Using ThreatQ and ThreatQ Investigations POSTED BY LIZ BUSH Although spear phishing has been around for years, organizations continue to fall victim as criminals evolve their methods. According to the most recent quarterly report from the Anti...