by Liz Bush | Jun 25, 2019 | Blog
Read what 585 of your peers told SANS in the 2019 Cyber Threat Intelligence Survey POSTED BY LIZ BUSH The 2019 SANS Cyber Threat Intelligence Survey is now available and includes responses from 585 security professionals across a wide variety of industries. This...
by Anthony Perridge | Jun 18, 2019 | Blog, Cybersecurity, Threat Intelligence
Leveraging CTI to benefit organisations’ security posture POSTED BY ANTHONY PERRIDGE One out of five companies are unsure of the value cyber threat intelligence can bring to their organisation.Over the last year, we have seen the cyber threat intelligence (CTI)...
by Anthony Perridge | Jun 11, 2019 | Blog, Cybersecurity, Threat Intelligence
Cyber Threat Intelligence: the key to trust and security for the digital finance world POSTED BY ANTHONY PERRIDGE In 2017, the value per Bitcoin reached over €20,000 (£17,324) – a climax in the hype surrounding the cryptocurrency. However, confidence has been...
by Ross Hammer | Jun 4, 2019 | Blog, Cybersecurity, Threat Intelligence
Making Use of Cyber Attribution Reports POSTED BY ROSS HAMMER Having recently read the Office of Director of National Intelligence’s (ODNI’s) “A Guide to Cyber Attribution,” I began to think of ways ThreatQ can help analysts use cyber attribution reports to improve...
by Cyrille Badeau | May 29, 2019 | Blog, Cybersecurity, Threat Intelligence
Put Together a Winning Game Plan Against Adversaries with MITRE ATT&CK POSTED BY CYRILLE BADEAU We recently held a seminar demonstrating how the MITRE ATT&CK framework can be leveraged across an entire cybersecurity practice. During the seminar it became clear to...
by Liz Bush | May 21, 2019 | Blog, Cybersecurity
Overcome the Vulnerability Management Challenge with ThreatQ POSTED BY LIZ BUSH The security industry has talked for years about the importance of vulnerability management as a basic security measure to prevent attacks. Yet vulnerabilities, and the exploitation of...