The ThreatQuotient Blog
EXPERTS SHARING THEIR CYBER THREAT INTELLIGENCE INSIGHTS AND EXPERIENCESThreatQuotient Tops Frost & Sullivan’s List of Technology Innovators in the Threat Intelligence Platform Industry
In their recent analysis of threat intelligence platforms, Frost & Sullivan named ThreatQuotient the 2019 Technology Innovation Leader in the sector.
Arming Security Operations for SOAR
You cannot defend against and respond to what you do not understand. Effective security operations must start with the threat.
Collaboration with Law Enforcement and Dynamic Cybersecurity: Building a Robust Defense
Proactivity is now seen by security teams as a viable solution to the challenge of defending enterprises against the ever-growing threat landscape.
Maintaining Control within Incident Response Investigations – Part 3
Security teams continuously look for ways to mature their process and improve their incident response efforts. Incident pruning should be one of the first activities to consider, however, it is commonly overlooked.
Maintaining Control within Incident Response Investigations – Part 2
In Part 1 of this series I landed on a recalibrated definition of incident pruning. Now, I want to demonstrate how ThreatQ Investigations can handle both incident thinning and incident deadheading methodologies.
McAfee Recognizes ThreatQuotient as 2019 SIA Global Partner of The Year
We are extremely proud to announce that ThreatQuotient was named McAfee’s 2019 Security Innovation Alliance (SIA) Global Partner of the Year.
ThreatQuotient Wins Inaugural Capital Cyber Award
I am honored to announce that earlier this week, ThreatQuotient was named the winner of the inaugural Northern Virginia Technology Council (NVTC) Capital Cyber Awards.
Maintaining Control within Incident Response Investigations – Part 1
Incident response investigations are complex efforts, shifting between chaos and order, as the incident lead maintains investigation alignment with IR policies, while the team chases down every possible clue leaving no stone unturned.
Evaluating SOAR Solutions?
Gartner projects “by the end of 2022, 30% of organizations with a security team larger than five people will leverage SOAR tools in their security operations, up from less than 5% today.
Learn how you can help a Rhino. Stop by our booth at one of these events!
ThreatQuotient is pleased to announce that we’re an official supporter of another organization called Helping Rhinos.
Successful threat hunting requires curation & collaboration
A mature threat hunting capability should automate the process of collecting intelligence and searching for atomic IoCs, like discrete IP addresses, domains and file hashes.
How to Effectively Manage Cyber Threats on Critical Infrastructure
Headlines about attacks on critical infrastructures are quickly portrayed as a sensation. It is often difficult to find the facts behind the report and to understand the impact of a large-scale cyber campaign on the business.
Combating TRISIS with the MITRE ATT&CK Framework
MITRE ATT&CK dives deep into adversaries’ actions so security analysts can use that information to their advantage. It is a huge step forward in creating a knowledgebase of adversaries and associated TTPs.
Victimology: in the shoes of a cybersecurity analyst
When a threat arises, the security team role is to investigate and determine the reality of an attack and its severity.
What’s Top of Mind for Black Hat Attendees, and How We Can Help
In preparation for Black Hat USA next week in Las Vegas, I reviewed the results from the new 2019 Black Hat Attendee Survey. The survey takes the pulse of 345 security professionals who have attended or plan to attend Black Hat USA.
An Up-Close Look at How to Increase Threat Hunting Efficiency
Threat hunting, the act of proactively searching for the existence of indicators of compromise within your environment, is a hot topic.
ThreatQuotient recognized for 4th consecutive year on CRN’s Emerging Vendors List
ThreatQuotient has been named to CRN’s Emerging Vendors list. The list recognizes new, rapidly growing companies that are leading in the area of IT innovation.
Real-Time Phishing Threat Intelligence from SlashNext now integrated with ThreatQ
SlashNext and ThreatQuotient have partnered to integrate SlashNext Real-Time Phishing Threat Intelligence with the ThreatQ platform.