The ThreatQuotient Blog
EXPERTS SHARING THEIR CYBER THREAT INTELLIGENCE INSIGHTS AND EXPERIENCESPrioritization is Key to Effective Vulnerability Management
To improve vulnerability management, you need the ability to focus your resources on addressing the known security weaknesses in your environment.
The MITRE ATT&CK Framework – A Sign of the Times
The security industry is placing greater emphasis on technologies, tools and processes that accelerate detection and response. One of the most interesting to come on the scene lately is the MITRE ATT&CK Frameworks™
RSAC USA: Then and Now
From the first RSAC USA in 1991 to the latest conference wrapping up just two weeks ago, there have been many changes.
Spear Phishing Analysis Using ThreatQ and ThreatQ Investigations
Although spear phishing has been around for years, organizations continue to fall victim as criminals evolve their methods.
Got 12 Minutes? See ThreatQuotient and Cisco Integration in Action
Chris Jacob sits down with Jason Wright to demonstrate how ThreatQ integrates with Cisco’s security portfolio, specifically Talos, Threat Grid and Umbrella.
TLP Inheritance – a minor but powerful feature
Traffic Light Protocol (TLP) is a pretty universal term these days, especially as STIX/TAXII is gaining momentum within the *-ISAC communities.
How ThreatQ and ThreatQ Investigations work with Endpoint Detection & Response (EDR) Systems
For decades, cyber technologies have been built for the common purpose of detecting and blocking threats.
Ovum’s Analysis of Threat Intelligence Platforms
If you plan to use one of the many security events this spring as an opportunity to research threat intelligence platforms (TIPs), consider arming yourself with the new Ovum Market Radar: Threat Intelligence Platforms report.
Intelligent Consolidation Rules All – the Underbelly of Communities
As an analyst you are always subconsciously consolidating information looking for investigation patterns, trends, or even the slightest hint of an attacker bending RFC rules to their advantage.
Four cybersecurity challenges that critical infrastructures are facing
Earlier this year, Russia started a widespread cyber-attack targeting critical infrastructures around the world, including tens of thousands of devices in British homes.
How ThreatQ Works with Visualization Tools
In this blog series, we’re focusing on how ThreatQ and ThreatQ Investigations augment and integrate with modern security tools and are able to replace legacy processes and systems.
Using Commercial Intel Feeds as a Warning Siren for Threat Hunting
Seems like Mitre’s ATT&CK framework is cyber bingo’s new “center square” and Marketing Teams across the globe are stretching to incorporate it into their upcoming RSA collateral.
How Well Does Your Incident Response Function Stack Up Against Your Peers?
We all know that incident response teams must operate in a very noisy environment, so it isn’t surprising that this year’s survey focuses on how to work our way through the noise to better defend our organizations.
ThreatQ Now Integrates with RSA Archer as part of the RSA Ready Program
Our integration with RSA Archer demonstrates once again the value of a threat-centric approach to security operations that integrates tools into a systemic security architecture.
How ThreatQ Works with Orchestration Tools
ThreatQ and ThreatQ Investigations work with orchestration and automation tools to provide integrated workflows that optimize time and user experience. Learn how.
If everything is important, nothing is. How to focus information to create actionable intelligence.
The high level of noise analysts face is a known fact. This is exacerbated when threat intelligence is entered directly into a SIEM or detection tools.
How ThreatQ Works with Ticketing Systems
This is another installment in a blog series discussing how ThreatQ and ThreatQ Investigations augment and integrate with modern security tools.
How ThreatQ Works with a SIEM
One of the capabilities that really ThreatQ apart is that it allows you to easily integrate tools into a single systemic security architecture.