by Liz Bush | Aug 28, 2019 | Blog, Cybersecurity, Threat Intelligence
Combating TRISIS with the MITRE ATT&CK Framework POSTED BY LIZ BUSH TRISIS malware was first discovered in August 2017 on an industrial control system at an oil refinery in Saudi Arabia. Multinational energy company, Schneider Electric, was shut down by particularly...
by Yann LeBorgne | Aug 20, 2019 | Blog, Cybersecurity
Victimology: in the shoes of a cybersecurity analyst POSTED BY YANN LE BORGNE A recent report from the government showed that 32% of businesses identified a cyber security attack in the last 12 months, and one of the most common attacks is spear-phishing – which...
by Liz Bush | Aug 2, 2019 | Blog, Cybersecurity
What’s Top of Mind for Black Hat Attendees, and How We Can Help POSTED BY LIZ BUSH In preparation for Black Hat USA next week in Las Vegas, I reviewed the results from the new 2019 Black Hat Attendee Survey. The survey takes the pulse of 345 security professionals who...
by Liz Bush | Jul 30, 2019 | Blog, Cybersecurity, Threat Intelligence
An Up-Close Look at How to Increase Threat Hunting Efficiency POSTED BY LIZ BUSH Threat hunting, the act of proactively searching for the existence of indicators of compromise within your environment, is a hot topic. Security teams engage in threat hunting when they...
by Haig Colter | Jul 23, 2019 | Blog, Cybersecurity
ThreatQuotient recognized for 4th consecutive year on CRN’s Emerging Vendors List POSTED BY HAIG COLTER I’m very pleased to share the news that for the fourth consecutive year ThreatQuotient has been named to CRN’s Emerging Vendors list. The list recognizes new,...
by John Czupak | Jul 9, 2019 | Blog, Cybersecurity, Threat Intelligence
SOAR vs. Security Operations: What’s Really Going On? POSTED BY JOHN CZUPAK There’s something big brewing in the world of security operations, but what exactly is it? We are regularly inundated with various descriptions of useful tools and capabilities (think Security...