The ThreatQuotient Blog
EXPERTS SHARING THEIR CYBER THREAT INTELLIGENCE INSIGHTS AND EXPERIENCESOvum’s Analysis of Threat Intelligence Platforms
If you plan to use one of the many security events this spring as an opportunity to research threat intelligence platforms (TIPs), consider arming yourself with the new Ovum Market Radar: Threat Intelligence Platforms report.
Intelligent Consolidation Rules All – the Underbelly of Communities
As an analyst you are always subconsciously consolidating information looking for investigation patterns, trends, or even the slightest hint of an attacker bending RFC rules to their advantage.
Four cybersecurity challenges that critical infrastructures are facing
Earlier this year, Russia started a widespread cyber-attack targeting critical infrastructures around the world, including tens of thousands of devices in British homes.
How ThreatQ Works with Visualization Tools
In this blog series, we’re focusing on how ThreatQ and ThreatQ Investigations augment and integrate with modern security tools and are able to replace legacy processes and systems.
Using Commercial Intel Feeds as a Warning Siren for Threat Hunting
Seems like Mitre’s ATT&CK framework is cyber bingo’s new “center square” and Marketing Teams across the globe are stretching to incorporate it into their upcoming RSA collateral.
How Well Does Your Incident Response Function Stack Up Against Your Peers?
We all know that incident response teams must operate in a very noisy environment, so it isn’t surprising that this year’s survey focuses on how to work our way through the noise to better defend our organizations.
ThreatQ Now Integrates with RSA Archer as part of the RSA Ready Program
Our integration with RSA Archer demonstrates once again the value of a threat-centric approach to security operations that integrates tools into a systemic security architecture.
How ThreatQ Works with Orchestration Tools
ThreatQ and ThreatQ Investigations work with orchestration and automation tools to provide integrated workflows that optimize time and user experience. Learn how.
If everything is important, nothing is. How to focus information to create actionable intelligence.
The high level of noise analysts face is a known fact. This is exacerbated when threat intelligence is entered directly into a SIEM or detection tools.
How ThreatQ Works with Ticketing Systems
This is another installment in a blog series discussing how ThreatQ and ThreatQ Investigations augment and integrate with modern security tools.
How ThreatQ Works with a SIEM
One of the capabilities that really ThreatQ apart is that it allows you to easily integrate tools into a single systemic security architecture.
How To Close Security Gaps With A Threat Intelligence Library
Companies have invested in protection technologies for decades – firewalls, web and email security gateways and endpoint protection.
The butler didn’t do it, so who did?
If you’re anything like me, then you’re going to love this cyber investigation challenge we’ve put together for you. You see, when I was a kid, I wanted to be a detective.
Threat Hunting Using ThreatQ and MITRE ATT&CK
The reality is that breaches happen. It is possible to start being proactive with the ThreatQ and MITRE Enterprise ATT&CK integration.
ThreatQuotient Team Set To Speak at 6 Events in October, Locally and Abroad
ThreatQuotient is looking forward to a busy October, full of events taking place across the globe. In particular, we have team members that will be traveling to speak at six events this month, spanning from Colorado to Germany.
Kicking Off Cybersecurity Awareness Month at Splunk.conf18
If your team is heading to Orlando for Splunk.conf18, carve out some time in your schedule to come see the ThreatQuotient team.
The Top 5 Cyberthreats to the Retail Industry and How to Prevent Them
Macy’s, Adidas, Panera Bread and Chili’s are just a few of the retailers and merchants who have fallen victim to cyberattacks in the last few months.
Spear phishing is an Equal Opportunity Threat
Unless you’ve cut yourself off from all media over the last two years, you’re probably familiar with the hack of the Democratic National Committee (DNC) during the 2016 Presidential election. What you may not know is that the vector the adversaries used was spear phishing.