by Liz Bush | Dec 10, 2019 | Blog, Cybersecurity, Threat Intelligence
Threat Hunting: Survey Results from the Trenches – Part 1 POSTED BY LIZ BUSH SANS recently published their 2019 Threat Hunting Survey in which they explore the differing needs of new and experienced threat hunters. In this three-part blog series, I provide an overview...
by Liz Bush | Nov 19, 2019 | Blog, Cybersecurity
How Government Agencies Can Use Existing Resources to Increase Situational Awareness POSTED BY LIZ BUSH According to a survey conducted by IDC, the digital transformation of U.S. federal agencies is putting citizen data and national secrets at risk. While digital...
by Liz Bush | Nov 12, 2019 | Blog, Cybersecurity
ThreatQuotient Tops Frost & Sullivan’s List of Technology Innovators in the Threat Intelligence Platform Industry POSTED BY LIZ BUSH In their recent analysis of threat intelligence platforms, Frost & Sullivan named ThreatQuotient the 2019 Technology Innovation...
by Liz Bush | Nov 5, 2019 | Blog, Cybersecurity
Arming Security Operations for SOAR POSTED BY LIZ BUSH Last year as the Security Orchestration, Automation and Response (SOAR) market started to garner attention, Gartner published a paper entitled, “Preparing your Security Operations for Orchestration and Automation...
by Jonathan Couch | Oct 29, 2019 | Blog, Cybersecurity
Collaboration with Law Enforcement and Dynamic Cybersecurity: Building a Robust Defense POSTED BY JONATHAN COUCH Proactivity is now seen by security teams as a viable solution to the challenge of defending enterprises against the ever-growing threat landscape. This...
by Ryan Trost | Oct 22, 2019 | Blog, Cybersecurity, Threat Intelligence
Maintaining Control within Incident Response Investigations - Part 3 POSTED BY RYAN TROST Security teams continuously look for ways to mature their process and improve their incident response efforts. Incident pruning should be one of the first activities to consider,...