by Ryan Trost | Aug 15, 2018 | Blog, Cybersecurity, Threat Intelligence
Timeline Analysis to Identify Campaign Attacks POSTED BY RYAN TROST Building from our previous spearphish investigation, let’s continue to dissect the robertwanger [at] aol.com spearphish attacks. Hypothesis – The six targeted spearphish attacks are split into...
by Ryan Trost | Jul 18, 2018 | Blog, Cybersecurity, Threat Intelligence
Victimology: Target Association POSTED BY RYAN TROST In a previous life, I managed two SOCs with 40+ analysts each, where a large component of the team was dedicated to threat intelligence, more specifically victimology. Admittedly I am by no means an expert at...
by Liz Bush | Jul 10, 2018 | Blog, Cybersecurity, Threat Intelligence
Need Some Tips on TIPs? POSTED BY LIZ BUSH Check out our new Buyer’s Guide Is your organization one of the many that is in the process of establishing its own threat intelligence operations, building Security Operations Centers (SOCs), incident response (IR)...
by Liz Bush | Jun 26, 2018 | Blog, Threat Intelligence
How ThreatQ Helps Analysts Become the “Go To” Source for Threat Intelligence POSTED BY LIZ BUSH The recent SANS 2018 Cyber Threat Intelligence Survey finds that 81% of cybersecurity professionals see value in threat intelligence. But are they getting the full value?...
by Neal Humphrey | Jun 19, 2018 | Blog, Cybersecurity, Threat Intelligence
The Advisor’s Workbench POSTED BY NEAL HUMPHREY In my last blog, I talk about some of the changes and opinions I see in the market and started a discussion around a label and a definition of a role that while new, someone(s) is already performing within security...
by Neal Humphrey | May 30, 2018 | Blog, Cybersecurity, Threat Intelligence
Rise of the Advisor: - RSA, Buzzwords, Automation, and a Path Forward POSTED BY NEAL HUMPHREY It’s been about two months since the end of RSA 2018, and about a month since the end of the avalanche of emails and phone calls (for what it is worth, I apologize). I think...