by Anthony Perridge | Jun 18, 2019 | Blog, Cybersecurity, Threat Intelligence
Leveraging CTI to benefit organisations’ security posture POSTED BY ANTHONY PERRIDGE One out of five companies are unsure of the value cyber threat intelligence can bring to their organisation.Over the last year, we have seen the cyber threat intelligence (CTI)...
by Anthony Perridge | Jun 11, 2019 | Blog, Cybersecurity, Threat Intelligence
Cyber Threat Intelligence: the key to trust and security for the digital finance world POSTED BY ANTHONY PERRIDGE In 2017, the value per Bitcoin reached over €20,000 (£17,324) – a climax in the hype surrounding the cryptocurrency. However, confidence has been...
by Ross Hammer | Jun 4, 2019 | Blog, Cybersecurity, Threat Intelligence
Making Use of Cyber Attribution Reports POSTED BY ROSS HAMMER Having recently read the Office of Director of National Intelligence’s (ODNI’s) “A Guide to Cyber Attribution,” I began to think of ways ThreatQ can help analysts use cyber attribution reports to improve...
by Cyrille Badeau | May 29, 2019 | Blog, Cybersecurity, Threat Intelligence
Put Together a Winning Game Plan Against Adversaries with MITRE ATT&CK POSTED BY CYRILLE BADEAU We recently held a seminar demonstrating how the MITRE ATT&CK framework can be leveraged across an entire cybersecurity practice. During the seminar it became clear to...
by Liz Bush | May 21, 2019 | Blog, Cybersecurity
Overcome the Vulnerability Management Challenge with ThreatQ POSTED BY LIZ BUSH The security industry has talked for years about the importance of vulnerability management as a basic security measure to prevent attacks. Yet vulnerabilities, and the exploitation of...
by Jonathan Couch | May 14, 2019 | Blog, Cybersecurity
Collaboration with Law Enforcement and Dynamic Cybersecurity: Building a Robust Defense POSTED BY JONATHAN COUCH Proactivity is now seen by security teams as a viable solution to the challenge of defending enterprises against the ever-growing threat landscape. This...