by John Czupak | Jul 9, 2019 | Blog, Cybersecurity, Threat Intelligence
SOAR vs. Security Operations: What’s Really Going On? POSTED BY JOHN CZUPAK There’s something big brewing in the world of security operations, but what exactly is it? We are regularly inundated with various descriptions of useful tools and capabilities (think Security...
by Liz Bush | Jun 25, 2019 | Blog
Read what 585 of your peers told SANS in the 2019 Cyber Threat Intelligence Survey POSTED BY LIZ BUSH The 2019 SANS Cyber Threat Intelligence Survey is now available and includes responses from 585 security professionals across a wide variety of industries. This...
by Anthony Perridge | Jun 18, 2019 | Blog, Cybersecurity, Threat Intelligence
Leveraging CTI to benefit organisations’ security posture POSTED BY ANTHONY PERRIDGE One out of five companies are unsure of the value cyber threat intelligence can bring to their organisation.Over the last year, we have seen the cyber threat intelligence (CTI)...
by Anthony Perridge | Jun 11, 2019 | Blog, Cybersecurity, Threat Intelligence
Cyber Threat Intelligence: the key to trust and security for the digital finance world POSTED BY ANTHONY PERRIDGE In 2017, the value per Bitcoin reached over €20,000 (£17,324) – a climax in the hype surrounding the cryptocurrency. However, confidence has been...
by Ross Hammer | Jun 4, 2019 | Blog, Cybersecurity, Threat Intelligence
Making Use of Cyber Attribution Reports POSTED BY ROSS HAMMER Having recently read the Office of Director of National Intelligence’s (ODNI’s) “A Guide to Cyber Attribution,” I began to think of ways ThreatQ can help analysts use cyber attribution reports to improve...
by Cyrille Badeau | May 29, 2019 | Blog, Cybersecurity, Threat Intelligence
Put Together a Winning Game Plan Against Adversaries with MITRE ATT&CK POSTED BY CYRILLE BADEAU We recently held a seminar demonstrating how the MITRE ATT&CK framework can be leveraged across an entire cybersecurity practice. During the seminar it became clear to...