by Nir Yosha | Jan 30, 2018 | Blog, Cybersecurity
Waking up to Critical Infrastructure Threats POSTED BY NIR YOSHA “Without change, something sleeps inside us, and seldom awakens. The sleeper must awaken.” This quote from Dune is one of my favorites because it speaks so well to the phenomenon we see around cyber...
by ThreatQ | Oct 31, 2017 | Blog, Cybersecurity
Farsight Security: 5 Questions with Jonathan Couch, Senior Vice President, Strategy, ThreatQuotient POSTED BY FARSIGHT SECURITY As part of their “5 Questions” series, Farsight Security, a trusted partner of ThreatQuotient, recently interviewed Jonathan...
by ThreatQ | Oct 25, 2017 | Blog, Cybersecurity
Leveraging NSFocus to Categorize Threats and Pinpoint Valuable Connections It is no surprise that everyone, including organizations, are vulnerable to a large amount of threats on a daily basis. In Q3 of 2016 alone, Panda Labs captured 18 million new malware samples;...
by Nir Yosha | Oct 10, 2017 | Blog, Cybersecurity
Integrating Qualys with ThreatQ to Correlate Vulnerabilities with Threat Intelligence POSTED BY NIR YOSHA As we discussed recently, the ThreatQ Threat Library now supports the inclusion of vulnerability data using the Common Vulnerabilities and Exposures (CVE)...
by Julian DeFronzo | Oct 4, 2017 | Blog, Cybersecurity
Get Smarter About Vulnerabilities POSTED BY JULIAN DEFRONZO Introducing CVE Indicator TypesWhile it may seem like you’re constantly hearing about a new attack method or cyber threat in the world, in reality, hackers are reusing exploits and tools as part of their...