The ThreatQuotient Blog
EXPERTS SHARING THEIR CYBER THREAT INTELLIGENCE INSIGHTS AND EXPERIENCESAttribution – One size doesn’t fit all
When it comes to security operations, you need to consider what level of attribution the different teams involved in protecting your organization need to be successful. Often knowing the group responsible or the campaign used is sufficient.
What does a truly Flexible Threat Intelligence Platform look like?
Working in a new market is always an interesting experience. I am reminded of this every time I go out to a trade show and quickly get the question: “So, what do you guys do?”
Animals Adapt their Defenses Based on Predators – We Must Too
Some animals bet on speed, others on protective shells, others on camouflage, the list goes on and on. Inventiveness is limitless but the objective is consistent: defend against “THE” main predator of the species concerned.
How ThreatQ Helps CISOs Empower Their Teams to Mitigate Risk
As breaches continue to dominate the headlines, affecting organizations of all sizes, in all industries and around the world, the pressure is high for C-level executives.
What is a Threat Library?
The first thought that comes to mind is that these are two terms really don’t belong together. A dangerous library? Why would I go there?
Statistics and Threat Intelligence
The joke is that “12 out of 10 Americans don’t believe in statistics.” But we still use statistics when looking at Amazon rating scores, watching the weather forecast, or during election cycles.
Threat Intelligence: Music or Noise?
There are a lot of similarities between threat intelligence and the music world. Threat intelligence is made up of multiple, aggregated threat data points (music notes) turned into relevant intelligence for your organization (your own music track).
Accelerating Our Mission to Never Stop Innovating
When executives see the latest breach headlines, the first thing they want to know is how their organization might be impacted, and what their security teams are doing about it.
The Power of the ThreatQ Open Exchange API – Part 2
Continuing our series on the ThreatQ Open Exchange API, today’s topic will cover working Adversaries and Events.
Farsight Security: 5 Questions with Jonathan Couch, Senior Vice President, Strategy, ThreatQuotient
As part of their “5 Questions” series, Farsight Security, a trusted partner of ThreatQuotient, recently interviewed Jonathan Couch, Senior Vice President of Strategy at ThreatQuotient.
Leveraging NSFocus to Categorize Threats and Pinpoint Valuable Connections
To help more organizations take a proactive stance, the ThreatQ Threat Intelligence Platform along with NSFocus provide a solution to more effectively identify and fight threats.
Ahoy There!
I guess it’s because I am an avid sailor that one of the concepts in the latest major release of the ThreatQ product really appealed to me.
Integrating Qualys with ThreatQ to Correlate Vulnerabilities with Threat Intelligence
Using the Qualys integration, ThreatQ can help organizations to identify the potential exploit targets and attack vectors within their environment.
Get Smarter About Vulnerabilities
While it may seem like you’re constantly hearing about a new attack method or cyber threat in the world, in reality, hackers are reusing exploits and tools as part of their campaigns.
ThreatQuotient Honored as SINET 16 Innovator for Two Consecutive Years
Each year, SINET receives hundreds of applications for this prestigious award from companies across the globe, but only the top 16 most innovative companies are named winners by the SINET Steering Committee.
Act on Security Reports in Just a Few Clicks
Every day, security reports or bulletins are released by intelligence providers, researchers and other organizations. Most often these reports…
Catching Phish with PhishMe Intelligence and ThreatQ
Swimming in a sea of threat intelligence indicators and services, security teams have been working towards effective ways to centralize, de-duplicate, and..
Threat Intelligence in Numbers
The number of connected people will increase from 2 billion today to around 6 billion by 2020. This means the network attack surface and the human attack…