by Liz Bush | Feb 5, 2019 | Blog, Cybersecurity, Threat Intelligence
Ovum’s Analysis of Threat Intelligence Platforms POSTED BY LIZ BUSH If you plan to use one of the many security events this spring as an opportunity to research threat intelligence platforms (TIPs), consider arming yourself with the new Ovum Market Radar: Threat...
by Ryan Trost | Jan 29, 2019 | Blog, Cybersecurity, Threat Intelligence
Intelligent Consolidation Rules All - the Underbelly of Communities POSTED BY RYAN TROST As an analyst you are always subconsciously consolidating information looking for investigation patterns, trends, or even the slightest hint of an attacker bending RFC rules to...
by Anthony Perridge | Jan 23, 2019 | Blog, Cybersecurity, Threat Intelligence
Four cybersecurity challenges that critical infrastructures are facing POSTED BY ANTHONY PERRIDGE In 2018, Russia started a widespread cyber-attack targeting critical infrastructures around the world, including tens of thousands of devices in British homes. So back in...
by Liz Bush | Jan 15, 2019 | Blog, Cybersecurity
How ThreatQ Works with Visualization Tools POSTED BY LIZ BUSH In this blog series, we’re focusing on how ThreatQ and ThreatQ Investigations augment and integrate with modern security tools and are able to replace legacy processes and systems. We accomplish this...
by Ryan Trost | Jan 8, 2019 | Blog, Cybersecurity, Threat Intelligence
Using Commercial Intel Feeds as a Warning Siren for Threat Hunting POSTED BY RYAN TROST Seems like Mitre’s ATT&CK framework is cyber bingo’s new “center square” and Marketing Teams across the globe are stretching to incorporate it into their upcoming RSA...
by Liz Bush | Dec 18, 2018 | Blog, Cybersecurity
How Well Does Your Incident Response Function Stack Up Against Your Peers? POSTED BY LIZ BUSH The security community is typically pretty great about sharing information among colleagues, including tips and tricks of the trade. If you want to learn about some of the...