by Cyrille Badeau | Nov 28, 2017 | Blog, Threat Intelligence
Threat Intelligence: Music or Noise? POSTED BY CYRILLE BADEAU During my college days, I played guitar in a band and it was rarely easy. Practicing in my bedroom so that I could learn how to play the song correctly was difficult, but with time I sounded pretty good....
by Andy Gepert | Oct 17, 2017 | Blog, Threat Intelligence
Ahoy There! POSTED BY MARTY WEBER I guess it’s because I am an avid sailor that one of the concepts in the latest major release of the ThreatQ threat intelligence platform product really appealed to me. I have all the requisite electronic bells and whistles on my...
by Leon Ward | Jul 6, 2017 | Blog, Threat Intelligence
It’s on like Donkey Kong! POSTED BY LEON WARD “It’s on like Donkey Kong!” – I’ve no idea where that phrase originally came from (and searching Google turned up some contradicting answers), but it describes the feeling here at ThreatQuotient this week since we’re...
by Ryan Trost | Jun 27, 2017 | Blog, Threat Intelligence
Nobody said Threat Intelligence Would be Easy POSTED BY RYAN TROST A new report by the Information Security Forum (ISF) entitled Threat Intelligence: React and Prepare is making headlines with its main finding that 25% of companies surveyed feel that threat...
by Kevin Libby | Jun 20, 2017 | Blog, Threat Intelligence
When it rains it pours…ThreatQ and Cisco Umbrella integration POSTED BY KEVIN LIBBY There have been many published articles that have covered the values and outcomes of leveraging the ThreatQ threat intelligence platform’s Adaptive Workbench. This capability allows...
by Julian DeFronzo | Jun 14, 2017 | Blog, Cybersecurity, Threat Intelligence
One of These Things Is Not Like the Other - Defending Against Homograph Attacks POSTED BY JULIAN DEFRONZO Recently there has been an increase in homograph attacks. These attacks take advantage of certain Unicode characters that look very similar to certain ASCII...