by ThreatQ | Oct 25, 2017 | Blog, Cybersecurity
Leveraging NSFocus to Categorize Threats and Pinpoint Valuable Connections It is no surprise that everyone, including organizations, are vulnerable to a large amount of threats on a daily basis. In Q3 of 2016 alone, Panda Labs captured 18 million new malware samples;...
by Andy Gepert | Oct 17, 2017 | Blog, Threat Intelligence
Ahoy There! POSTED BY MARTY WEBER I guess it’s because I am an avid sailor that one of the concepts in the latest major release of the ThreatQ threat intelligence platform product really appealed to me. I have all the requisite electronic bells and whistles on my...
by Nir Yosha | Oct 10, 2017 | Blog, Cybersecurity
Integrating Qualys with ThreatQ to Correlate Vulnerabilities with Threat Intelligence POSTED BY NIR YOSHA As we discussed recently, the ThreatQ Threat Library now supports the inclusion of vulnerability data using the Common Vulnerabilities and Exposures (CVE)...
by Julian DeFronzo | Oct 4, 2017 | Blog, Cybersecurity
Get Smarter About Vulnerabilities POSTED BY JULIAN DEFRONZO Introducing CVE Indicator TypesWhile it may seem like you’re constantly hearing about a new attack method or cyber threat in the world, in reality, hackers are reusing exploits and tools as part of their...
by ThreatQ | Sep 27, 2017 | Blog, Cybersecurity
ThreatQuotient Honored as SINET 16 Innovator for Two Consecutive Years POSTED BY THREATQUOTIENT We are excited to share that for the second year in a row, the Security Innovation Network (SINET) has selected ThreatQuotient™ as one of the 16 most innovative...
by Mike Clark | Sep 19, 2017 | Blog, Cybersecurity
Act on Security Reports in Just a Few Clicks POSTED BY MIKE CLARK Every day, security reports or bulletins are released by intelligence providers, researchers and other organizations. Most often these reports come in PDFs or other formats that are not machine...