The ThreatQuotient Blog
EXPERTS SHARING THEIR CYBER THREAT INTELLIGENCE INSIGHTS AND EXPERIENCESPreparing for FS-ISAC Annual Summit: Financial Threat Actors are on the Rise
As financial institutions continue to fall prey to large cyber attacks, it is extremely critical that they equip their security teams with the appropriate tools.
Recorded Future Custom Connector updates for ThreatQ
We have made significant changes to ThreatQ’s Recorded Future Custom Connector to support Recorded Future’s new API changes and additional risk lists.
Product Methodology: Operations vs. Sharing
During the time when we were designing the initial phases of our threat intelligence platform (TIP), we determined that there were some important core principles that should drive how we built the product.
Referral Partner Program
In today’s fast paced security landscape, customers are doing their best to keep their infrastructure secure from the latest breaches and threats.
Blanket Deployment of Intelligence is Counterproductive
The ThreatQ platform offers a two-step resolution through our new scoring feature. It starts by properly scoring intelligence for your environment, which I’ve discussed in detail in multiple blogs and in a new whitepaper.
Come See ThreatQuotient Next Week at SANS THIR
Take some time to swing by the exhibitor’s hall to visit our booth and to hear how ThreatQ, our Threat Intelligence Platform (TIP), can help your security team collaborate together efficiently…
To Optimize Threat Operations, Start with Customized Scoring
You need a way to quickly re-score providers’ intelligence – aligning it to your own risk posture and prioritized based on threats specific to your environment – so you get the maximum benefit from threat intelligence.
Project Honey Maid: Using ThreatQ to Research NoSQL Ransomware Attacks
Over the next few weeks, we will investigate just how rampant these types of attacks are, how we utilize the ThreatQ platform to house our research and utilize Operations for investigation and enrichment.
Bridging the Gap: Come See the ThreatQuotient Team at SINET ITSEF 2017
If you’d like to chat with our team of experts about how your organization can use CTI and a TIP to maximize current security investments, come see us at SINET ITSEF 2017!
How to Use ThreatQ to Defend Against Ransomware
Ransomware is still a major money maker for cyber criminals and victims are all over the board, ranging from individuals to major corporations.
How to Leverage the ThreatQ Threat Library Using Carbon Black
Using the Exports section of ThreatQ, analysts are able to make data available to the team or tool that needs to consume the critical threat data using the Carbon Black integration.
A Guide to Indicator Expiration
There is no shortage of indicator data these days. Large numbers of providers, both commercial and free, have set up shop to help fight the cause.
Scoring…the Initial Pitfall is a B*tch
What happens when 2 Team Leads (w/ support from the rest of their immediate team) in a SOC “agree to disagree”? …they both compromise settling on middle ground.
Enriching an Indicator with Operations
ThreatQ Operations offers a tremendously powerful investigation and analysis capability to automate efforts across common workflows.
Scoring: "Trust but Verify"
Instead of adding to the data noise – we allow teams to be more efficient with scores!
Aging Intelligence Tier II – Maturing Deprecation & Scoring
The next evolution of deprecation and scoring is developing several advanced “aging” algorithms.
Aging Intelligence Tier II – Maturing Deprecation & Scoring
The next evolution of deprecation and scoring is developing several advanced “aging” algorithms.
I want more “Stuff.”
“Everybody’s gotta have a little place for their stuff. That’s all life is about. Trying to find a place for your stuff.” — George Carlin