by Jonathan Couch | Jan 17, 2018 | Blog, Threat Intelligence
Attribution – One size doesn’t fit all POSTED BY JONATHAN COUCH When you’re a victim of a crime it’s human nature to want to know who is responsible. You call and report it. The police come. They conduct an investigation. And hopefully they can track down the guilty...
by Neal Humphrey | Jan 10, 2018 | Blog, Threat Intelligence
What does a truly Flexible Threat Intelligence Platform look like? POSTED BY NEAL HUMPHREY The ThreatQ Fantasy Football Use CaseWorking in a new market is always an interesting experience. I am reminded of this every time I go out to a trade show and quickly get the...
by Cyrille Badeau | Jan 3, 2018 | Blog, Threat Intelligence
Animals Adapt their Defenses Based on Predators – We Must Too POSTED BY CYRILLE BADEAU Let’s observe for a moment nature all around us. Each species has developed a method of defense based on a single criterion — the capability of its main predator. Some...
by Liz Bush | Dec 19, 2017 | Blog, Threat Intelligence
How ThreatQ Helps CISOs Empower Their Teams to Mitigate Risk POSTED BY LIZ BUSH As breaches continue to dominate the headlines, affecting organizations of all sizes, in all industries and around the world, the pressure is high for C-level executives. We talk to CISOs...
by Neal Humphrey | Dec 12, 2017 | Blog, Threat Intelligence
What is a Threat Library? POSTED BY NEAL HUMPHREY Find out more about ThreatQ's Threat Library Learn More The first thought that comes to mind is that these are two terms really don’t belong together. A dangerous library? Why would I go there?The second thought that...
by Nir Yosha | Dec 5, 2017 | Blog, Threat Intelligence
Statistics and Threat Intelligence POSTED BY NIR YOSHA The joke is that “12 out of 10 Americans don’t believe in statistics.” But we still use statistics when looking at Amazon rating scores, watching the weather forecast, or during election cycles. Personally, I...