by Ryan Trost | Jan 8, 2019 | Blog, Cybersecurity, Threat Intelligence
Using Commercial Intel Feeds as a Warning Siren for Threat Hunting POSTED BY RYAN TROST Seems like Mitre’s ATT&CK framework is cyber bingo’s new “center square” and Marketing Teams across the globe are stretching to incorporate it into their upcoming RSA...
by Liz Bush | Dec 18, 2018 | Blog, Cybersecurity
How Well Does Your Incident Response Function Stack Up Against Your Peers? POSTED BY LIZ BUSH The security community is typically pretty great about sharing information among colleagues, including tips and tricks of the trade. If you want to learn about some of the...
by Haig Colter | Dec 11, 2018 | Blog, Corporate
ThreatQ Now Integrates with RSA Archer as part of the RSA Ready Program POSTED BY HAIG COLTER We’re excited to share the news with you today that our ecosystem of partner products we support just got even larger with the addition of RSA Archer!Say goodbye to cutting...
by Jon Warren | Dec 5, 2018 | Blog, Cybersecurity, Threat Intelligence
How ThreatQ Works with Orchestration Tools POSTED BY JON WARREN In previous blogs we’ve discussed how ThreatQ and ThreatQ Investigations augment and integrate with SIEM and ticketing systems. Here, I’ll explain how ThreatQ and ThreatQ Investigations work with...
by Ross Hammer | Nov 27, 2018 | Blog, Threat Intelligence
If everything is important, nothing is. How to focus information to create actionable intelligence. POSTED BY ROSS HAMMER The high level of noise analysts face is a known fact. This is exacerbated when threat intelligence is entered directly into a SIEM or detection...
by Dave Krasik | Nov 13, 2018 | Blog, Cybersecurity, Threat Intelligence
How ThreatQ Works with Ticketing Systems POSTED BY DAVE KRASIK This is another installment in a blog series discussing how ThreatQ and ThreatQ Investigations augment and integrate with modern security tools and can replace legacy processes and systems. What allows us...