by Liz Bush | Mar 26, 2019 | Blog, Cybersecurity, Threat Intelligence
The MITRE ATT&CK Framework – A Sign of the Times POSTED BY LIZ BUSH There was a time when we believed that we could prevent every attack. But despite a defense-in-depth strategy, as the years progressed we realized this wasn’t possible. Attacks are happening with...
by Alison Adkins | Mar 21, 2019 | Blog, Cybersecurity
RSAC USA: Then and Now POSTED BY ALISON ADKINS From the first RSAC USA in 1991 to the latest conference wrapping up just two weeks ago, there have been many changes. Although US fashion trends from the early 90’s may have peaked, disappeared and resurfaced in 2019...
by Liz Bush | Mar 12, 2019 | Blog, Cybersecurity, Threat Intelligence
Spear Phishing Analysis Using ThreatQ and ThreatQ Investigations POSTED BY LIZ BUSH Although spear phishing has been around for years, organizations continue to fall victim as criminals evolve their methods. According to the most recent quarterly report from the Anti...
by Liz Bush | Mar 6, 2019 | Blog, Cybersecurity
Got 12 Minutes? See ThreatQuotient and Cisco Integration in Action POSTED BY LIZ BUSH If you haven’t seen it yet, I encourage you to check out this recent episode of ThreatWise TV – coverage and live demos of the latest developments in Cisco cybersecurity, hosted by...
by Ryan Trost | Feb 26, 2019 | Blog, Cybersecurity, Threat Intelligence
TLP Inheritance - a minor but powerful feature POSTED BY RYAN TROST Traffic Light Protocol (TLP) is a pretty universal term these days, especially as STIX/TAXII is gaining momentum within the *-ISAC communities. However, for completeness its a sensitivity marking term...
by Liz Bush | Feb 12, 2019 | Blog, Cybersecurity, Threat Intelligence
How ThreatQ and ThreatQ Investigations work with Endpoint Detection & Response (EDR) Systems POSTED BY LIZ BUSH For decades, cyber technologies have been built for the common purpose of detecting and blocking threats. When a new type of threat appeared, companies...