by Ryan Trost | Feb 26, 2019 | Blog, Cybersecurity, Threat Intelligence
TLP Inheritance - a minor but powerful feature POSTED BY RYAN TROST Traffic Light Protocol (TLP) is a pretty universal term these days, especially as STIX/TAXII is gaining momentum within the *-ISAC communities. However, for completeness its a sensitivity marking term...
by Liz Bush | Feb 12, 2019 | Blog, Cybersecurity, Threat Intelligence
How ThreatQ and ThreatQ Investigations work with Endpoint Detection & Response (EDR) Systems POSTED BY LIZ BUSH For decades, cyber technologies have been built for the common purpose of detecting and blocking threats. When a new type of threat appeared, companies...
by Liz Bush | Feb 5, 2019 | Blog, Cybersecurity, Threat Intelligence
Ovum’s Analysis of Threat Intelligence Platforms POSTED BY LIZ BUSH If you plan to use one of the many security events this spring as an opportunity to research threat intelligence platforms (TIPs), consider arming yourself with the new Ovum Market Radar: Threat...
by Ryan Trost | Jan 29, 2019 | Blog, Cybersecurity, Threat Intelligence
Intelligent Consolidation Rules All - the Underbelly of Communities POSTED BY RYAN TROST As an analyst you are always subconsciously consolidating information looking for investigation patterns, trends, or even the slightest hint of an attacker bending RFC rules to...
by Anthony Perridge | Jan 23, 2019 | Blog, Cybersecurity, Threat Intelligence
Four cybersecurity challenges that critical infrastructures are facing POSTED BY ANTHONY PERRIDGE In 2018, Russia started a widespread cyber-attack targeting critical infrastructures around the world, including tens of thousands of devices in British homes. So back in...
by Liz Bush | Jan 15, 2019 | Blog, Cybersecurity
How ThreatQ Works with Visualization Tools POSTED BY LIZ BUSH In this blog series, we’re focusing on how ThreatQ and ThreatQ Investigations augment and integrate with modern security tools and are able to replace legacy processes and systems. We accomplish this...