by Chris Jacob | Aug 17, 2016 | Blog, Threat Intelligence
Takeaway from Vegas: Threat Intelligence is Maturing POSTED BY CHRIS JACOB If you have anything to do with cybersecurity, chances are you were in Las Vegas earlier this month for Black Hat. In fact, I probably spoke with many of you. I had the opportunity to meet with...
by ThreatQ | Jul 28, 2016 | Blog, Threat Intelligence
“TIPs” to Address Black Hat Attendees’ Concerns POSTED BY JARROD SIKET In anticipation of Black Hat next week in Las Vegas, the results from the 2016 Black Hat Attendee Survey are in. Being in the threat intelligence business, I found two areas particularly...
by ThreatQ | Jul 20, 2016 | Blog, Threat Intelligence
First things First: Define Your Threat Intelligence Program POSTED BY JARROD SIKET If you look at the stats that Jon Oltsik, ESG senior principal analyst, cites in his article about operationalizing threat intelligence you’ll quickly see that a third of all...
by Ryan Trost | Jul 15, 2016 | Blog, Threat Intelligence
TIP vs. SIEM vs. Ticketing System – Part 2 POSTED BY RYAN TROST If you read part 1 of this post you understand why funneling threat intelligence directly into a SIEM isn’t a viable option if you want to get the most from your external data feeds and your analysts’...
by Ryan Trost | Jul 12, 2016 | Blog, Threat Intelligence
TIP vs. SIEM vs. Ticketing System – Part 1 POSTED BY RYAN TROST Remember the show I Love Lucy and the skit in the chocolate factory? Lucy and Ethel can’t keep up – the faster the conveyor belt, the more chocolates to wrap. It kind of reminds me of the challenge many...
by Chris Jacob | Jul 8, 2016 | Blog, Threat Intelligence
Core Functions of a Threat Intelligence Platform — Part 2: Enriching Threat Intelligence POSTED BY CHRIS JACOB So you’ve used your threat intelligence platform (TIP) to wrangle the herd of data feeds into something manageable. What’s next? How do you take this subset...