by Anthony Perridge | Jan 23, 2019 | Blog, Cybersecurity, Threat Intelligence
Four cybersecurity challenges that critical infrastructures are facing POSTED BY ANTHONY PERRIDGE In 2018, Russia started a widespread cyber-attack targeting critical infrastructures around the world, including tens of thousands of devices in British homes. So back in...
by Ryan Trost | Jan 8, 2019 | Blog, Cybersecurity, Threat Intelligence
Using Commercial Intel Feeds as a Warning Siren for Threat Hunting POSTED BY RYAN TROST Seems like Mitre’s ATT&CK framework is cyber bingo’s new “center square” and Marketing Teams across the globe are stretching to incorporate it into their upcoming RSA...
by Jon Warren | Dec 5, 2018 | Blog, Cybersecurity, Threat Intelligence
How ThreatQ Works with Orchestration Tools POSTED BY JON WARREN In previous blogs we’ve discussed how ThreatQ and ThreatQ Investigations augment and integrate with SIEM and ticketing systems. Here, I’ll explain how ThreatQ and ThreatQ Investigations work with...
by Ross Hammer | Nov 27, 2018 | Blog, Threat Intelligence
If everything is important, nothing is. How to focus information to create actionable intelligence. POSTED BY ROSS HAMMER The high level of noise analysts face is a known fact. This is exacerbated when threat intelligence is entered directly into a SIEM or detection...
by Dave Krasik | Nov 13, 2018 | Blog, Cybersecurity, Threat Intelligence
How ThreatQ Works with Ticketing Systems POSTED BY DAVE KRASIK This is another installment in a blog series discussing how ThreatQ and ThreatQ Investigations augment and integrate with modern security tools and can replace legacy processes and systems. What allows us...
by Jon Warren | Oct 31, 2018 | Blog, Cybersecurity, Threat Intelligence
How ThreatQ Works with a SIEM POSTED BY JON WARREN One of the capabilities that sets ThreatQ apart is that it allows you to easily integrate tools into a single systemic security architecture and then automates both the removal of noise and the actions needed to...