The ThreatQuotient Blog
EXPERTS SHARING THEIR CYBER THREAT INTELLIGENCE INSIGHTS AND EXPERIENCESThreatQ and Phantom: Injecting Contextual Threat Intel into Security Automation and Orchestration
ThreatQuotient has partnered with Phantom to develop a Phantom App that integrates seamlessly into existing Phantom Playbooks.
Win Big with ThreatQuotient’s New Partner Integration Program
“Talent wins games, but teamwork and intelligence wins championships.” – Michael Jordan
Taking the Journey with our Clients: ThreatQuotient’s New Professional Services Offering
Whether you’re scaling a mountain, losing weight, or learning to meditate, you rarely go it alone. Coaches, guides, trainers, nutritionists, advisors and instructors are there to help…
ThreatQ 3.0 Adheres to Einstein’s 3 Rules to Streamline Threat Operations
Einstein had three rules of work: 1) out of clutter find simplicity, 2) from discord find harmony, and 3) in the middle of difficulty lies opportunity.
Taking Action on GRIZZLY STEPPE Data with ThreatQ
ThreatQ can parse and ingest all three file formats, and in this blog post we will demonstrate how to use this information in ThreatQ and your security infrastructure.
Best-in-Class Collide: Announcing our Official Partnership with Vandis!
As the network security landscape is continuously morphing, vendors are being pushed to innovate and provide the right solutions while also being driven to form strategic partnerships in the industry.
Rhinos in San Francisco?? Come see the ThreatQuotient Crash at RSA 2017
Come meet with our CTI experts to discuss how you can empower your teams with their own threat operations and management program!
Expiration [Entry-Level Deprecation]
Expiration Tier I is the “entry-level” strategy taking two critical factors into consideration including Source and Indicator Type…
Need to get out of the office? Swing by Suits and Spooks DC!!
This week the ThreatQuotient team will be at Suits and Spooks DC held at the CEB Waterview Conference Center!
Investigating Spear phish Incidents with ThreatQ: Part 2
In this article, we will use the ThreatQ platform to investigate the site and learn more about what it may be hosting and, thus, what may have been downloaded.
Examining Ricochet Effects of Spear phishing Campaigns
There are many ways your organization can be affected by a spearphishing attack beyond the obvious – being the direct target.
Investigating Spear Phish Incidents with ThreatQ: Part 1
Spear phishing is a form of social engineering and undoubtedly one of the most successful and prolific attack vectors an adversary will use to compromise a target.
ThreatQ's "Signature" Difference
ThreatQ stands apart – providing an advanced way to process signature content that turns threat data into intelligence that is actionable.
Cyber Threat Intelligence Webcast: Hurricanes and Earthquakes
The key question covered in the Couch’s talk is how will organizations need to adapt to make the most use of this knowledge within security operations.
Situational Awareness vs. Situational Understanding – is intelligence passing you by?
The value of situational understanding is becoming more intimate with your adversary, your network, and your defenses.
Crashing into New Orleans, Speaking at MISTI Threat Intelligence Summit
Global Director of Threat Intelligence Engineering, Chris Jacob, will be speaking at the New Orleans Threat Intelligence Summit hosted by MISTI Training Institute.
Simpler, not Simple, Security
I’ve come to a realization: You cannot group security capabilities or maturity in a sizing model.
Flipping TQ on its back as a File Integrity Management System to Discover Webshells
TQ isn’t a SIEM but by twisting its usage it can be used as an innovative file integrity management system…