by Anthony Stitt | Oct 24, 2018 | Blog, Cybersecurity, Threat Intelligence
How To Close Security Gaps With A Threat Intelligence Library POSTED BY ANTHONY STITT Companies have invested in protection technologies for decades – firewalls, web and email security gateways and endpoint protection. Over time, these technologies have increasingly...
by Liz Bush | Oct 12, 2018 | Blog, Cybersecurity
The butler didn’t do it, so who did? POSTED BY LIZ BUSH If you’re anything like me, then you’re going to love this cyber investigation challenge we’ve put together for you. You see, when I was a kid, I wanted to be a detective. Part of that was the influence of shows...
by Steve Rivers | Oct 9, 2018 | Blog, Cybersecurity, Threat Intelligence
Threat Hunting Using ThreatQ and MITRE ATT&CK POSTED BY STEVE RIVERS AND NIR YOSHA The reality is that breaches happen. The key is responding to them quickly and effectively. Many businesses are very reactive when responding to threats. It is, however, possible to...
by Liz Bush | Oct 1, 2018 | Blog, Corporate
ThreatQuotient Team Set To Speak at 6 Events in October, Locally and Abroad POSTED BY LIZ BUSH ThreatQuotient is looking forward to a busy October, full of events taking place across the globe. In particular, we have team members that will be traveling to speak at six...
by ThreatQ | Sep 26, 2018 | Blog, Corporate
Kicking Off Cybersecurity Awareness Month at Splunk.conf18 POSTED BY THREATQ That’s right. Next week the ThreatQuotient team is kicking off National Cybersecurity Awareness Month in Orlando, FL at Splunk.conf18. If your team is heading to Orlando for the conference,...
by Liz Bush | Sep 18, 2018 | Blog, Cybersecurity, Threat Intelligence
The Top 5 Cyberthreats to the Retail Industry and How to Prevent Them POSTED BY LIZ BUSH Macy’s, Adidas, Panera Bread and Chili’s are just a few of the retailers and merchants who have fallen victim to cyberattacks in the last few months, putting payment card data and...