The ThreatQuotient Blog
EXPERTS SHARING THEIR CYBER THREAT INTELLIGENCE INSIGHTS AND EXPERIENCESThreat Hunting: Survey Results from the Trenches – Part 3
The eternal question when making technology investment decisions is whether to invest in people, process or technology.
Threat Hunting: Survey Results from the Trenches – Part 2
Threat hunting is a complex task and presents many challenges. If organizations aren’t careful, they can end up with a few high-value resources spending inordinate amounts of time potentially chasing ghosts.
Threat Hunting: Survey Results from the Trenches – Part 1
Given that threat hunting is still in its early stages for most companies and teams are relatively small, organizations need to think creatively about how to structure security operations teams and processes to help threat hunters work efficiently.
Would You Like An Award To Go With That Award?
I’m pleased to announce that ThreatQuotient was named a Northern Virginia Technology Council, 2019 NVTC Tech 100 company of the year.
How Government Agencies Can Use Existing Resources to Increase Situational Awareness
Government agency computer systems are a treasure trove for threat actors given the vast amount of sensitive information they contain and critical infrastructure they run.
ThreatQuotient Tops Frost & Sullivan’s List of Technology Innovators in the Threat Intelligence Platform Industry
In their recent analysis of threat intelligence platforms, Frost & Sullivan named ThreatQuotient the 2019 Technology Innovation Leader in the sector.
Arming Security Operations for SOAR
You cannot defend against and respond to what you do not understand. Effective security operations must start with the threat.
Collaboration with Law Enforcement and Dynamic Cybersecurity: Building a Robust Defense
Proactivity is now seen by security teams as a viable solution to the challenge of defending enterprises against the ever-growing threat landscape.
Maintaining Control within Incident Response Investigations – Part 3
Security teams continuously look for ways to mature their process and improve their incident response efforts. Incident pruning should be one of the first activities to consider, however, it is commonly overlooked.
Maintaining Control within Incident Response Investigations – Part 2
In Part 1 of this series I landed on a recalibrated definition of incident pruning. Now, I want to demonstrate how ThreatQ Investigations can handle both incident thinning and incident deadheading methodologies.
McAfee Recognizes ThreatQuotient as 2019 SIA Global Partner of The Year
We are extremely proud to announce that ThreatQuotient was named McAfee’s 2019 Security Innovation Alliance (SIA) Global Partner of the Year.
ThreatQuotient Wins Inaugural Capital Cyber Award
I am honored to announce that earlier this week, ThreatQuotient was named the winner of the inaugural Northern Virginia Technology Council (NVTC) Capital Cyber Awards.
Maintaining Control within Incident Response Investigations – Part 1
Incident response investigations are complex efforts, shifting between chaos and order, as the incident lead maintains investigation alignment with IR policies, while the team chases down every possible clue leaving no stone unturned.
Evaluating SOAR Solutions?
Gartner projects “by the end of 2022, 30% of organizations with a security team larger than five people will leverage SOAR tools in their security operations, up from less than 5% today.
Learn how you can help a Rhino. Stop by our booth at one of these events!
ThreatQuotient is pleased to announce that we’re an official supporter of another organization called Helping Rhinos.
Successful threat hunting requires curation & collaboration
A mature threat hunting capability should automate the process of collecting intelligence and searching for atomic IoCs, like discrete IP addresses, domains and file hashes.
How to Effectively Manage Cyber Threats on Critical Infrastructure
Headlines about attacks on critical infrastructures are quickly portrayed as a sensation. It is often difficult to find the facts behind the report and to understand the impact of a large-scale cyber campaign on the business.
Combating TRISIS with the MITRE ATT&CK Framework
MITRE ATT&CK dives deep into adversaries’ actions so security analysts can use that information to their advantage. It is a huge step forward in creating a knowledgebase of adversaries and associated TTPs.