The ThreatQuotient Blog
EXPERTS SHARING THEIR CYBER THREAT INTELLIGENCE INSIGHTS AND EXPERIENCESSuccessful threat hunting requires curation & collaboration
A mature threat hunting capability should automate the process of collecting intelligence and searching for atomic IoCs, like discrete IP addresses, domains and file hashes.
How to Effectively Manage Cyber Threats on Critical Infrastructure
Headlines about attacks on critical infrastructures are quickly portrayed as a sensation. It is often difficult to find the facts behind the report and to understand the impact of a large-scale cyber campaign on the business.
Combating TRISIS with the MITRE ATT&CK Framework
MITRE ATT&CK dives deep into adversaries’ actions so security analysts can use that information to their advantage. It is a huge step forward in creating a knowledgebase of adversaries and associated TTPs.
Victimology: in the shoes of a cybersecurity analyst
When a threat arises, the security team role is to investigate and determine the reality of an attack and its severity.
What’s Top of Mind for Black Hat Attendees, and How We Can Help
In preparation for Black Hat USA next week in Las Vegas, I reviewed the results from the new 2019 Black Hat Attendee Survey. The survey takes the pulse of 345 security professionals who have attended or plan to attend Black Hat USA.
An Up-Close Look at How to Increase Threat Hunting Efficiency
Threat hunting, the act of proactively searching for the existence of indicators of compromise within your environment, is a hot topic.
ThreatQuotient recognized for 4th consecutive year on CRN’s Emerging Vendors List
ThreatQuotient has been named to CRN’s Emerging Vendors list. The list recognizes new, rapidly growing companies that are leading in the area of IT innovation.
Real-Time Phishing Threat Intelligence from SlashNext now integrated with ThreatQ
SlashNext and ThreatQuotient have partnered to integrate SlashNext Real-Time Phishing Threat Intelligence with the ThreatQ platform.
SOAR vs. Security Operations: What’s Really Going On?
What problems are we trying to solve in today’s Security Operations Center (SOC)? If you get right to the point, there are many inefficiencies in processes, which result in delayed detection and response times.
Read what 585 of your peers told SANS in the 2019 Cyber Threat Intelligence Survey
This year’s survey focuses on how and why CTI is being used, how it is helping defenders, what data sources are being leveraged, and how data is converted into usable intelligence.
Leveraging CTI to benefit organisations’ security posture
Over the last year, we have seen the cyber threat intelligence (CTI) community growing and diversifying; as a result, the way threat intelligence is being used has also evolved.
Cyber Threat Intelligence: the key to trust and security for the digital finance world
In no industry is the subjective perception of security as important as in the field of finance. Both private users and large customers are increasingly handling transactions online.
Making Use of Cyber Attribution Reports
ThreatQ can be a central repository for the intelligence reports analysts produce, allowing the information to link object types, be searched and act as a knowledge base for analysts and security teams.
Put Together a Winning Game Plan Against Adversaries with MITRE ATT&CK
MITRE ATT&CK is a tool that allows you to get a structured and detailed understanding of your opponents’ game strategies.
Overcome the Vulnerability Management Challenge with ThreatQ
The security industry has talked for years about the importance of vulnerability management as a basic security measure to prevent attacks.
Collaboration with Law Enforcement and Dynamic Cybersecurity: Building a Robust Defense
Proactivity is now seen by security teams as a viable solution to the challenge of defending enterprises against the ever-growing threat landscape.
3 Tips to Improve Your Alert Triage Process
To overcome the alert triage challenge, analysts need a way to efficiently and accurately go through alerts to determine which ones matter most and require human attention and eliminate the ones that do not.
What Financial Services Institutions Should Know About Social Media Risk
Three out of four banking customers surveyed agree or strongly agree that social media is important to their banks, with Facebook, LinkedIn, Twitter, YouTube and Instagram being the most popular platforms.