The ThreatQuotient Blog
EXPERTS SHARING THEIR CYBER THREAT INTELLIGENCE INSIGHTS AND EXPERIENCESIntegrating Wapack Labs CTAC with ThreatQ
Most threat intelligence providers just offer curated intelligence, CTAC gives you direct access to the raw data which allows analysts a lot of flexibility.
Major Take-Aways from Black Hat USA
Last week, the ThreatQuotient team attended the annual conference and met with many cybersecurity professionals to discuss various concerns for the upcoming year.
Using ThreatQ and Blueliv to Gain Greater Insights and Prioritize Threats
In this day and age, almost every device is a potential target for some form of malicious attack. In this post, we will take a look at the intelligence that Blueliv Threat Intelligence Feed provides in order to help combat these attacks.
Stepping out of my Comfort Zone
As a career cyber startup executive, I can talk for hours about the challenges organizations face as the threat landscape accelerates and gets increasingly complex.
Meet with ThreatQuotient at Black Hat USA 2017
The ThreatQuotient crash is packed and ready to head to Las Vegas for one of the year’s most elusive cyber security conferences, Black Hat USA.
WannaCry from the Bleachers…
Or Wanna Cry or Wanna Crypt or Wcry2 or EternalBlue with Doublepulsar, you get the idea.
Are You Part of the 72% that Believe Cybersecurity is Getting Harder?
According to new research published by Enterprise Strategy Group, 72% of cybersecurity and IT professionals believe that cybersecurity analytics and operations is more difficult today than it was two years ago.
It’s on like Donkey Kong!
We’re excited to announce version 3.1 of the ThreatQ Threat Intelligence Platform!
Nobody said Threat Intelligence Would be Easy
A new report by the Information Security Forum (ISF) entitled Threat Intelligence: React and Prepare is making headlines with its main finding that 25% of companies surveyed feel that threat intelligence is delivering on its promise.
When it rains it pours…ThreatQ and Cisco Umbrella integration
There have been many published articles that have covered the values and outcomes of leveraging the ThreatQ Platform’s Adaptive Workbench.
One of These Things Is Not Like the Other – Defending Against Homograph Attacks
With ThreatQ and just a few simple steps you can more effectively detect and defend against the surge in homograph attacks.
Using Threat Intelligence to Defend Against 0day Vulnerabilities
As a security professional, I am always amused by the reaction to 0day announcements. On one hand, there is always a strong interest in technically understanding the vulnerability and how it is exploited.
Ransomware – The Non-Technical But Fascinating Ripple
One of the silver-lining effects of a global cyber scare such as WannaCry ransomware is the trigger to catch up with friends to discuss fact vs. fiction of the threat research and other ‘bigger picture’ observations.
Buy vs. Build: Tales from the Trenches
In mid-2010 I was running a large Defense contractor SOC and was forced to build what’s currently known as a threat intelligence platform (TIP).
It’s Time to Think Differently about Threat Operations
Can you really “manage” threats? Is that even a worthwhile goal? And how do you define a threat?
The Watchlist: Collaborating to Build Better Adversary Dossiers Faster
Have you ever wanted to be alerted about new information related to the TTP of an adversary? Well now that’s possible!
Leveraging ThreatQ and AutoFocus to Combat Ransomware
In this post, we will look at “AutoFocus,” which gives access to Palo Alto’s Wildfire data and, when used with ThreatQ, allows you to more effectively and efficiently combat ransomware.
Preparing for FS-ISAC Annual Summit: Financial Threat Actors are on the Rise
As financial institutions continue to fall prey to large cyber attacks, it is extremely critical that they equip their security teams with the appropriate tools.