The ThreatQuotient Blog
EXPERTS SHARING THEIR CYBER THREAT INTELLIGENCE INSIGHTS AND EXPERIENCESWannaCry from the Bleachers…
Or Wanna Cry or Wanna Crypt or Wcry2 or EternalBlue with Doublepulsar, you get the idea.
Are You Part of the 72% that Believe Cybersecurity is Getting Harder?
According to new research published by Enterprise Strategy Group, 72% of cybersecurity and IT professionals believe that cybersecurity analytics and operations is more difficult today than it was two years ago.
It’s on like Donkey Kong!
We’re excited to announce version 3.1 of the ThreatQ Threat Intelligence Platform!
Nobody said Threat Intelligence Would be Easy
A new report by the Information Security Forum (ISF) entitled Threat Intelligence: React and Prepare is making headlines with its main finding that 25% of companies surveyed feel that threat intelligence is delivering on its promise.
When it rains it pours…ThreatQ and Cisco Umbrella integration
There have been many published articles that have covered the values and outcomes of leveraging the ThreatQ Platform’s Adaptive Workbench.
One of These Things Is Not Like the Other – Defending Against Homograph Attacks
With ThreatQ and just a few simple steps you can more effectively detect and defend against the surge in homograph attacks.
Using Threat Intelligence to Defend Against 0day Vulnerabilities
As a security professional, I am always amused by the reaction to 0day announcements. On one hand, there is always a strong interest in technically understanding the vulnerability and how it is exploited.
Ransomware – The Non-Technical But Fascinating Ripple
One of the silver-lining effects of a global cyber scare such as WannaCry ransomware is the trigger to catch up with friends to discuss fact vs. fiction of the threat research and other ‘bigger picture’ observations.
Buy vs. Build: Tales from the Trenches
In mid-2010 I was running a large Defense contractor SOC and was forced to build what’s currently known as a threat intelligence platform (TIP).
It’s Time to Think Differently about Threat Operations
Can you really “manage” threats? Is that even a worthwhile goal? And how do you define a threat?
The Watchlist: Collaborating to Build Better Adversary Dossiers Faster
Have you ever wanted to be alerted about new information related to the TTP of an adversary? Well now that’s possible!
Leveraging ThreatQ and AutoFocus to Combat Ransomware
In this post, we will look at “AutoFocus,” which gives access to Palo Alto’s Wildfire data and, when used with ThreatQ, allows you to more effectively and efficiently combat ransomware.
Preparing for FS-ISAC Annual Summit: Financial Threat Actors are on the Rise
As financial institutions continue to fall prey to large cyber attacks, it is extremely critical that they equip their security teams with the appropriate tools.
Recorded Future Custom Connector updates for ThreatQ
We have made significant changes to ThreatQ’s Recorded Future Custom Connector to support Recorded Future’s new API changes and additional risk lists.
Product Methodology: Operations vs. Sharing
During the time when we were designing the initial phases of our threat intelligence platform (TIP), we determined that there were some important core principles that should drive how we built the product.
Referral Partner Program
In today’s fast paced security landscape, customers are doing their best to keep their infrastructure secure from the latest breaches and threats.
Blanket Deployment of Intelligence is Counterproductive
The ThreatQ platform offers a two-step resolution through our new scoring feature. It starts by properly scoring intelligence for your environment, which I’ve discussed in detail in multiple blogs and in a new whitepaper.
Come See ThreatQuotient Next Week at SANS THIR
Take some time to swing by the exhibitor’s hall to visit our booth and to hear how ThreatQ, our Threat Intelligence Platform (TIP), can help your security team collaborate together efficiently…