The ThreatQuotient Blog
EXPERTS SHARING THEIR CYBER THREAT INTELLIGENCE INSIGHTS AND EXPERIENCESVictimology: in the shoes of a cybersecurity analyst
When a threat arises, the security team role is to investigate and determine the reality of an attack and its severity.
What’s Top of Mind for Black Hat Attendees, and How We Can Help
In preparation for Black Hat USA next week in Las Vegas, I reviewed the results from the new 2019 Black Hat Attendee Survey. The survey takes the pulse of 345 security professionals who have attended or plan to attend Black Hat USA.
An Up-Close Look at How to Increase Threat Hunting Efficiency
Threat hunting, the act of proactively searching for the existence of indicators of compromise within your environment, is a hot topic.
ThreatQuotient recognized for 4th consecutive year on CRN’s Emerging Vendors List
ThreatQuotient has been named to CRN’s Emerging Vendors list. The list recognizes new, rapidly growing companies that are leading in the area of IT innovation.
Real-Time Phishing Threat Intelligence from SlashNext now integrated with ThreatQ
SlashNext and ThreatQuotient have partnered to integrate SlashNext Real-Time Phishing Threat Intelligence with the ThreatQ platform.
SOAR vs. Security Operations: What’s Really Going On?
What problems are we trying to solve in today’s Security Operations Center (SOC)? If you get right to the point, there are many inefficiencies in processes, which result in delayed detection and response times.
Read what 585 of your peers told SANS in the 2019 Cyber Threat Intelligence Survey
This year’s survey focuses on how and why CTI is being used, how it is helping defenders, what data sources are being leveraged, and how data is converted into usable intelligence.
Leveraging CTI to benefit organisations’ security posture
Over the last year, we have seen the cyber threat intelligence (CTI) community growing and diversifying; as a result, the way threat intelligence is being used has also evolved.
Cyber Threat Intelligence: the key to trust and security for the digital finance world
In no industry is the subjective perception of security as important as in the field of finance. Both private users and large customers are increasingly handling transactions online.
Making Use of Cyber Attribution Reports
ThreatQ can be a central repository for the intelligence reports analysts produce, allowing the information to link object types, be searched and act as a knowledge base for analysts and security teams.
Put Together a Winning Game Plan Against Adversaries with MITRE ATT&CK
MITRE ATT&CK is a tool that allows you to get a structured and detailed understanding of your opponents’ game strategies.
Overcome the Vulnerability Management Challenge with ThreatQ
The security industry has talked for years about the importance of vulnerability management as a basic security measure to prevent attacks.
Collaboration with Law Enforcement and Dynamic Cybersecurity: Building a Robust Defense
Proactivity is now seen by security teams as a viable solution to the challenge of defending enterprises against the ever-growing threat landscape.
3 Tips to Improve Your Alert Triage Process
To overcome the alert triage challenge, analysts need a way to efficiently and accurately go through alerts to determine which ones matter most and require human attention and eliminate the ones that do not.
What Financial Services Institutions Should Know About Social Media Risk
Three out of four banking customers surveyed agree or strongly agree that social media is important to their banks, with Facebook, LinkedIn, Twitter, YouTube and Instagram being the most popular platforms.
How to Tackle the Challenges of Threat Hunting
It’s also important to remember that threat hunting must be a continuous process. As new data and learnings are added to the central repository, intelligence is reprioritized to support ongoing hunts.
8 Key Questions to Ask about Operating a TIP in an Air-gapped Environment
ThreatQ provides flexibility in how you deploy and use the platform to meet your specific security and environment requirements.
A Maturity Model for Deriving Value from the MITRE ATT&CK Framework
Nearly every organization is interested in using MITRE ATT&CK, but they have different views on how it should be adopted based their capabilities.