The ThreatQuotient Blog
EXPERTS SHARING THEIR CYBER THREAT INTELLIGENCE INSIGHTS AND EXPERIENCESDigital Threat Intelligence Management Brings Better Signal and Less Noise
Nearly one billion personal records and just over one billion credentials were stolen in 2016, with similar statistics in 2017.
Insider Threat: Focusing From The Inside Out
In Flashpoint’s latest blog post, Séan McGurk and ThreatQuotient’s Jonathan Couch talk about insider threat challenges, mitigations, and best practices.
Enhancing threat intelligence services through collaboration
The reality of cybersecurity today is that adversaries are always advancing, which means that, as defenders, we must continue to advance the state of security operations and management.
Hitting the Trifecta – More Recognition from CRN
As CRN describes the recognition, the Channel Chiefs list honors the best of the best – leaders who build, support and deliver superior partner programs and strategy. Those making the list are chosen by CRN editors based on their track record of channel accomplishments.
Polarity and ThreatQ Integration
In Polarity’s latest collaboration, they teamed up with ThreatQuotient to build a seriously powerful threat intelligence combination.
Waking up to Critical Infrastructure Threats
“Without change, something sleeps inside us, and seldom awakens. The sleeper must awaken.” This quote from Dune is one of my favorites because it speaks so well to the phenomenon we see around cyber attacks, particularly those targeting critical infrastructure.
How ThreatQ Helps SOCs Streamline Tasks to Focus on Higher Priority Threats
Alexander Graham Bell said, “Before anything else, preparation is the key to success.”
Attribution – One size doesn’t fit all
When it comes to security operations, you need to consider what level of attribution the different teams involved in protecting your organization need to be successful. Often knowing the group responsible or the campaign used is sufficient.
What does a truly Flexible Threat Intelligence Platform look like?
Working in a new market is always an interesting experience. I am reminded of this every time I go out to a trade show and quickly get the question: “So, what do you guys do?”
Animals Adapt their Defenses Based on Predators – We Must Too
Some animals bet on speed, others on protective shells, others on camouflage, the list goes on and on. Inventiveness is limitless but the objective is consistent: defend against “THE” main predator of the species concerned.
How ThreatQ Helps CISOs Empower Their Teams to Mitigate Risk
As breaches continue to dominate the headlines, affecting organizations of all sizes, in all industries and around the world, the pressure is high for C-level executives.
What is a Threat Library?
The first thought that comes to mind is that these are two terms really don’t belong together. A dangerous library? Why would I go there?
Statistics and Threat Intelligence
The joke is that “12 out of 10 Americans don’t believe in statistics.” But we still use statistics when looking at Amazon rating scores, watching the weather forecast, or during election cycles.
Threat Intelligence: Music or Noise?
There are a lot of similarities between threat intelligence and the music world. Threat intelligence is made up of multiple, aggregated threat data points (music notes) turned into relevant intelligence for your organization (your own music track).
Accelerating Our Mission to Never Stop Innovating
When executives see the latest breach headlines, the first thing they want to know is how their organization might be impacted, and what their security teams are doing about it.
The Power of the ThreatQ Open Exchange API – Part 2
Continuing our series on the ThreatQ Open Exchange API, today’s topic will cover working Adversaries and Events.
Farsight Security: 5 Questions with Jonathan Couch, Senior Vice President, Strategy, ThreatQuotient
As part of their “5 Questions” series, Farsight Security, a trusted partner of ThreatQuotient, recently interviewed Jonathan Couch, Senior Vice President of Strategy at ThreatQuotient.
Leveraging NSFocus to Categorize Threats and Pinpoint Valuable Connections
To help more organizations take a proactive stance, the ThreatQ Threat Intelligence Platform along with NSFocus provide a solution to more effectively identify and fight threats.