by Kevin Libby | May 24, 2018 | Blog, Threat Intelligence
Above and Beyond STIX POSTED BY KEVIN LIBBY We’re getting smarter. We as organizations are certainly moving in the right direction in respect to how we tackle cyber security initiatives. Cyber security is actively being discussed in boardrooms, by senior executives,...
by Ryan Trost | May 15, 2018 | Blog, Threat Intelligence
The ‘REAL’ Distinction of Threat Intelligence Platforms POSTED BY RYAN TROST Threat Intelligence Providers or Threat Intelligence PlatformsThreat intelligence vendors are starting to dilute the term ‘platform’ in order to expand their target addressable market (TAM)...
by Michel Huffaker | May 1, 2018 | Blog, Threat Intelligence
Identity Crisis: Proving the Value of Intelligence Through Internal Marketing POSTED BY MICHEL HUFFAKER When I started my career as a “classically trained” intelligence analyst operating in the public sector, there was very little ambiguity about my role:...
by Marc Solomon | Apr 26, 2018 | Blog, Cybersecurity, Threat Intelligence
Redefining a Threat Intelligence Platform to Address the Challenges of Security Operations POSTED BY MARC SOLOMON We’ve said this many times before: ThreatQuotient was founded with the belief that a threat intelligence platform must do more than just aggregate and...
by Leon Ward | Apr 12, 2018 | Blog, Cybersecurity, Threat Intelligence
Bringing order to security operations with ThreatQ Investigations POSTED BY LEON WARD I’m commonly heard saying that aspects of security operations and incident response are chaotic, but what do I mean by this? How can something that is so very technical, somewhat...
by Haig Colter | Apr 5, 2018 | Blog, Corporate, Threat Intelligence
Our Programmatic Approach to Partner Ecosystem Growth POSTED BY HAIG COLTER Earlier this week CRN released its 2018 Partner Program Guide – a “go to” list of partner programs from technology vendors that provide products and services through the IT channel. We’re...