The ThreatQuotient Blog
EXPERTS SHARING THEIR CYBER THREAT INTELLIGENCE INSIGHTS AND EXPERIENCESTo Optimize Threat Operations, Start with Customized Scoring
You need a way to quickly re-score providers’ intelligence – aligning it to your own risk posture and prioritized based on threats specific to your environment – so you get the maximum benefit from threat intelligence.
Project Honey Maid: Using ThreatQ to Research NoSQL Ransomware Attacks
Over the next few weeks, we will investigate just how rampant these types of attacks are, how we utilize the ThreatQ platform to house our research and utilize Operations for investigation and enrichment.
Bridging the Gap: Come See the ThreatQuotient Team at SINET ITSEF 2017
If you’d like to chat with our team of experts about how your organization can use CTI and a TIP to maximize current security investments, come see us at SINET ITSEF 2017!
How to Use ThreatQ to Defend Against Ransomware
Ransomware is still a major money maker for cyber criminals and victims are all over the board, ranging from individuals to major corporations.
How to Leverage the ThreatQ Threat Library Using Carbon Black
Using the Exports section of ThreatQ, analysts are able to make data available to the team or tool that needs to consume the critical threat data using the Carbon Black integration.
A Guide to Indicator Expiration
There is no shortage of indicator data these days. Large numbers of providers, both commercial and free, have set up shop to help fight the cause.
Scoring…the Initial Pitfall is a B*tch
What happens when 2 Team Leads (w/ support from the rest of their immediate team) in a SOC “agree to disagree”? …they both compromise settling on middle ground.
Enriching an Indicator with Operations
ThreatQ Operations offers a tremendously powerful investigation and analysis capability to automate efforts across common workflows.
Scoring: "Trust but Verify"
Instead of adding to the data noise – we allow teams to be more efficient with scores!
Aging Intelligence Tier II – Maturing Deprecation & Scoring
The next evolution of deprecation and scoring is developing several advanced “aging” algorithms.
Aging Intelligence Tier II – Maturing Deprecation & Scoring
The next evolution of deprecation and scoring is developing several advanced “aging” algorithms.
I want more “Stuff.”
“Everybody’s gotta have a little place for their stuff. That’s all life is about. Trying to find a place for your stuff.” — George Carlin
ThreatQ and Phantom: Injecting Contextual Threat Intel into Security Automation and Orchestration
ThreatQuotient has partnered with Phantom to develop a Phantom App that integrates seamlessly into existing Phantom Playbooks.
Win Big with ThreatQuotient’s New Partner Integration Program
“Talent wins games, but teamwork and intelligence wins championships.” – Michael Jordan
Taking the Journey with our Clients: ThreatQuotient’s New Professional Services Offering
Whether you’re scaling a mountain, losing weight, or learning to meditate, you rarely go it alone. Coaches, guides, trainers, nutritionists, advisors and instructors are there to help…
ThreatQ 3.0 Adheres to Einstein’s 3 Rules to Streamline Threat Operations
Einstein had three rules of work: 1) out of clutter find simplicity, 2) from discord find harmony, and 3) in the middle of difficulty lies opportunity.
Taking Action on GRIZZLY STEPPE Data with ThreatQ
ThreatQ can parse and ingest all three file formats, and in this blog post we will demonstrate how to use this information in ThreatQ and your security infrastructure.
Best-in-Class Collide: Announcing our Official Partnership with Vandis!
As the network security landscape is continuously morphing, vendors are being pushed to innovate and provide the right solutions while also being driven to form strategic partnerships in the industry.