The ThreatQuotient Blog
EXPERTS SHARING THEIR CYBER THREAT INTELLIGENCE INSIGHTS AND EXPERIENCESAhoy There!
I guess it’s because I am an avid sailor that one of the concepts in the latest major release of the ThreatQ product really appealed to me.
Integrating Qualys with ThreatQ to Correlate Vulnerabilities with Threat Intelligence
Using the Qualys integration, ThreatQ can help organizations to identify the potential exploit targets and attack vectors within their environment.
Get Smarter About Vulnerabilities
While it may seem like you’re constantly hearing about a new attack method or cyber threat in the world, in reality, hackers are reusing exploits and tools as part of their campaigns.
ThreatQuotient Honored as SINET 16 Innovator for Two Consecutive Years
Each year, SINET receives hundreds of applications for this prestigious award from companies across the globe, but only the top 16 most innovative companies are named winners by the SINET Steering Committee.
Act on Security Reports in Just a Few Clicks
Every day, security reports or bulletins are released by intelligence providers, researchers and other organizations. Most often these reports…
Catching Phish with PhishMe Intelligence and ThreatQ
Swimming in a sea of threat intelligence indicators and services, security teams have been working towards effective ways to centralize, de-duplicate, and..
Threat Intelligence in Numbers
The number of connected people will increase from 2 billion today to around 6 billion by 2020. This means the network attack surface and the human attack…
The Power of the ThreatQ Open Exchange API – Part 1
While most user interaction with the ThreatQ platform is done from the user interface, you can discover just how extensible and powerful the platform is…
Integrating Wapack Labs CTAC with ThreatQ
Most threat intelligence providers just offer curated intelligence, CTAC gives you direct access to the raw data which allows analysts a lot of flexibility.
Major Take-Aways from Black Hat USA
Last week, the ThreatQuotient team attended the annual conference and met with many cybersecurity professionals to discuss various concerns for the upcoming year.
Using ThreatQ and Blueliv to Gain Greater Insights and Prioritize Threats
In this day and age, almost every device is a potential target for some form of malicious attack. In this post, we will take a look at the intelligence that Blueliv Threat Intelligence Feed provides in order to help combat these attacks.
Stepping out of my Comfort Zone
As a career cyber startup executive, I can talk for hours about the challenges organizations face as the threat landscape accelerates and gets increasingly complex.
Meet with ThreatQuotient at Black Hat USA 2017
The ThreatQuotient crash is packed and ready to head to Las Vegas for one of the year’s most elusive cyber security conferences, Black Hat USA.
WannaCry from the Bleachers…
Or Wanna Cry or Wanna Crypt or Wcry2 or EternalBlue with Doublepulsar, you get the idea.
Are You Part of the 72% that Believe Cybersecurity is Getting Harder?
According to new research published by Enterprise Strategy Group, 72% of cybersecurity and IT professionals believe that cybersecurity analytics and operations is more difficult today than it was two years ago.
It’s on like Donkey Kong!
We’re excited to announce version 3.1 of the ThreatQ Threat Intelligence Platform!
Nobody said Threat Intelligence Would be Easy
A new report by the Information Security Forum (ISF) entitled Threat Intelligence: React and Prepare is making headlines with its main finding that 25% of companies surveyed feel that threat intelligence is delivering on its promise.
When it rains it pours…ThreatQ and Cisco Umbrella integration
There have been many published articles that have covered the values and outcomes of leveraging the ThreatQ Platform’s Adaptive Workbench.