by Jon Warren | Dec 5, 2018 | Blog, Cybersecurity, Threat Intelligence
How ThreatQ Works with Orchestration Tools POSTED BY JON WARREN In previous blogs we’ve discussed how ThreatQ and ThreatQ Investigations augment and integrate with SIEM and ticketing systems. Here, I’ll explain how ThreatQ and ThreatQ Investigations work with...
by Dave Krasik | Nov 13, 2018 | Blog, Cybersecurity, Threat Intelligence
How ThreatQ Works with Ticketing Systems POSTED BY DAVE KRASIK This is another installment in a blog series discussing how ThreatQ and ThreatQ Investigations augment and integrate with modern security tools and can replace legacy processes and systems. What allows us...
by Jon Warren | Oct 31, 2018 | Blog, Cybersecurity, Threat Intelligence
How ThreatQ Works with a SIEM POSTED BY JON WARREN One of the capabilities that sets ThreatQ apart is that it allows you to easily integrate tools into a single systemic security architecture and then automates both the removal of noise and the actions needed to...
by Anthony Stitt | Oct 24, 2018 | Blog, Cybersecurity, Threat Intelligence
How To Close Security Gaps With A Threat Intelligence Library POSTED BY ANTHONY STITT Companies have invested in protection technologies for decades – firewalls, web and email security gateways and endpoint protection. Over time, these technologies have increasingly...
by Liz Bush | Oct 12, 2018 | Blog, Cybersecurity
The butler didn’t do it, so who did? POSTED BY LIZ BUSH If you’re anything like me, then you’re going to love this cyber investigation challenge we’ve put together for you. You see, when I was a kid, I wanted to be a detective. Part of that was the influence of shows...
by Steve Rivers | Oct 9, 2018 | Blog, Cybersecurity, Threat Intelligence
Threat Hunting Using ThreatQ and MITRE ATT&CK POSTED BY STEVE RIVERS AND NIR YOSHA The reality is that breaches happen. The key is responding to them quickly and effectively. Many businesses are very reactive when responding to threats. It is, however, possible to...