The ThreatQuotient Blog
EXPERTS SHARING THEIR CYBER THREAT INTELLIGENCE INSIGHTS AND EXPERIENCESA Guide to Indicator Expiration
There is no shortage of indicator data these days. Large numbers of providers, both commercial and free, have set up shop to help fight the cause.
Scoring…the Initial Pitfall is a B*tch
What happens when 2 Team Leads (w/ support from the rest of their immediate team) in a SOC “agree to disagree”? …they both compromise settling on middle ground.
Enriching an Indicator with Operations
ThreatQ Operations offers a tremendously powerful investigation and analysis capability to automate efforts across common workflows.
Scoring: "Trust but Verify"
Instead of adding to the data noise – we allow teams to be more efficient with scores!
Aging Intelligence Tier II – Maturing Deprecation & Scoring
The next evolution of deprecation and scoring is developing several advanced “aging” algorithms.
Aging Intelligence Tier II – Maturing Deprecation & Scoring
The next evolution of deprecation and scoring is developing several advanced “aging” algorithms.
I want more “Stuff.”
“Everybody’s gotta have a little place for their stuff. That’s all life is about. Trying to find a place for your stuff.” — George Carlin
ThreatQ and Phantom: Injecting Contextual Threat Intel into Security Automation and Orchestration
ThreatQuotient has partnered with Phantom to develop a Phantom App that integrates seamlessly into existing Phantom Playbooks.
Win Big with ThreatQuotient’s New Partner Integration Program
“Talent wins games, but teamwork and intelligence wins championships.” – Michael Jordan
Taking the Journey with our Clients: ThreatQuotient’s New Professional Services Offering
Whether you’re scaling a mountain, losing weight, or learning to meditate, you rarely go it alone. Coaches, guides, trainers, nutritionists, advisors and instructors are there to help…
ThreatQ 3.0 Adheres to Einstein’s 3 Rules to Streamline Threat Operations
Einstein had three rules of work: 1) out of clutter find simplicity, 2) from discord find harmony, and 3) in the middle of difficulty lies opportunity.
Taking Action on GRIZZLY STEPPE Data with ThreatQ
ThreatQ can parse and ingest all three file formats, and in this blog post we will demonstrate how to use this information in ThreatQ and your security infrastructure.
Best-in-Class Collide: Announcing our Official Partnership with Vandis!
As the network security landscape is continuously morphing, vendors are being pushed to innovate and provide the right solutions while also being driven to form strategic partnerships in the industry.
Rhinos in San Francisco?? Come see the ThreatQuotient Crash at RSA 2017
Come meet with our CTI experts to discuss how you can empower your teams with their own threat operations and management program!
Expiration [Entry-Level Deprecation]
Expiration Tier I is the “entry-level” strategy taking two critical factors into consideration including Source and Indicator Type…
Need to get out of the office? Swing by Suits and Spooks DC!!
This week the ThreatQuotient team will be at Suits and Spooks DC held at the CEB Waterview Conference Center!
Investigating Spear phish Incidents with ThreatQ: Part 2
In this article, we will use the ThreatQ platform to investigate the site and learn more about what it may be hosting and, thus, what may have been downloaded.
Examining Ricochet Effects of Spear phishing Campaigns
There are many ways your organization can be affected by a spearphishing attack beyond the obvious – being the direct target.