by Liz Bush | Jun 8, 2021 | Blog, Cybersecurity, Threat Intelligence
See how to Amplify your SIEM by Integrating with the ThreatQ Platform LIZ BUSH SIEMs have been around for decades, designed to replace manual log correlation to identify suspicious network activity by normalizing alerts across multiple technology vendors. SIEMs...
by Liz Bush | Jun 2, 2021 | Blog, Cybersecurity, Threat Intelligence
How Analysts can use the OODA Loop to Strengthen their Skillsets LIZ BUSH For many years, cybersecurity professionals have talked about the OODA loop. Devised by Colonel John Boyd, it describes a decision-making cycle that fighter pilots apply in dog fights, and when...
by Liz Bush | May 25, 2021 | Blog, Cybersecurity, Threat Intelligence
What Makes a Security Analyst Successful? Investigative Thinking LIZ BUSH The new SANS 2021 Report: Top Skills Analysts Need to Master analyzes the need for organizations to invest in improving their security operations and identifies the skills analysts must master...
by Liz Bush | May 18, 2021 | Blog, Cybersecurity, Threat Intelligence
Threat Intelligence, Integration and Automation in a Modern SOC LIZ BUSH As organizations continue to evolve their security operations maturity and the SOC increasingly focuses on detection and response, three capabilities are foundational for success – threat...
by Liz Bush | May 11, 2021 | Blog, Cybersecurity, Threat Intelligence
Empower your Security Team to Master SANS’ Top Skillsets: Investigative Tasks LIZ BUSH We all know the security industry mantra: it’s not a matter of if, but when and how we’ll be attacked. Recent reports of intrusion activity increasing fourfold in the last two years...
by Leon Ward | May 4, 2021 | Blog, Cybersecurity, Threat Intelligence
Simplify Automation and Orchestration with a Data-driven Approach to SOAR and XDR LEON WARD On the heels of announcing the closing of $22.5 million in new financing as a result of strong performance in 2020, I’m proud of our team’s latest innovation that we’re...