by Ryan Trost | Oct 2, 2019 | Blog, Cybersecurity, Threat Intelligence
Maintaining Control within Incident Response Investigations - Part 1 POSTED BY RYAN TROST Several weeks ago, I grabbed a drink with a friend and he randomly mentioned the term “incident pruning” and how critical it is to security operations efficiency. He’s got nearly...
by Liz Bush | Sep 24, 2019 | Blog, Cybersecurity, Threat Intelligence
Evaluating SOAR Solutions? POSTED BY LIZ BUSH Download this New Gartner Report Over the last 18 months there’s been increasing discussion within the security community about security orchestration, automation and response, or SOAR. It’s a term coined by Gartner so I...
by Liz Bush | Sep 18, 2019 | Blog, Cybersecurity, Threat Intelligence
Learn how you can help a Rhino. Stop by our booth at one of these events! POSTED BY LIZ BUSH If you know ThreatQuotient, then you know we have a thing for rhinos! The image of a rhino is part of our logo and we put a rhino on nearly everything. We even give away...
by Anthony Stitt | Sep 10, 2019 | Blog, Cybersecurity, Threat Intelligence
Successful threat hunting requires curation & collaboration POSTED BY ANTHONY STITT Many organisations are harnessing the benefits of technology to enhance their business, yet the reality is that their systems are often compromised as a result. This has become both...
by Markus Auer | Sep 4, 2019 | Blog, Cybersecurity, Threat Intelligence
How to Effectively Manage Cyber Threats on Critical Infrastructure POSTED BY MARKUS AUER Criminals are tirelessly attacking critical infrastructure (CRITIS) around the world and compromising the Industrial Control System (ICS) and the Supervisory Control and Data...
by Liz Bush | Aug 28, 2019 | Blog, Cybersecurity, Threat Intelligence
Combating TRISIS with the MITRE ATT&CK Framework POSTED BY LIZ BUSH TRISIS malware was first discovered in August 2017 on an industrial control system at an oil refinery in Saudi Arabia. Multinational energy company, Schneider Electric, was shut down by particularly...