by Nir Yosha | Jan 30, 2018 | Blog, Cybersecurity
Waking up to Critical Infrastructure Threats POSTED BY NIR YOSHA “Without change, something sleeps inside us, and seldom awakens. The sleeper must awaken.” This quote from Dune is one of my favorites because it speaks so well to the phenomenon we see around cyber...
by Liz Bush | Jan 23, 2018 | Blog, Threat Intelligence
How ThreatQ Helps SOCs Streamline Tasks to Focus on Higher Priority Threats POSTED BY LIZ BUSH Alexander Graham Bell said, “Before anything else, preparation is the key to success.” Intellectually and in our gut, we all know this is true. The problem is that...
by Jonathan Couch | Jan 17, 2018 | Blog, Threat Intelligence
Attribution – One size doesn’t fit all POSTED BY JONATHAN COUCH When you’re a victim of a crime it’s human nature to want to know who is responsible. You call and report it. The police come. They conduct an investigation. And hopefully they can track down the guilty...
by Neal Humphrey | Jan 10, 2018 | Blog, Threat Intelligence
What does a truly Flexible Threat Intelligence Platform look like? POSTED BY NEAL HUMPHREY The ThreatQ Fantasy Football Use CaseWorking in a new market is always an interesting experience. I am reminded of this every time I go out to a trade show and quickly get the...
by Cyrille Badeau | Jan 3, 2018 | Blog, Threat Intelligence
Animals Adapt their Defenses Based on Predators – We Must Too POSTED BY CYRILLE BADEAU Let’s observe for a moment nature all around us. Each species has developed a method of defense based on a single criterion — the capability of its main predator. Some...
by Liz Bush | Dec 19, 2017 | Blog, Threat Intelligence
How ThreatQ Helps CISOs Empower Their Teams to Mitigate Risk POSTED BY LIZ BUSH As breaches continue to dominate the headlines, affecting organizations of all sizes, in all industries and around the world, the pressure is high for C-level executives. We talk to CISOs...