The ThreatQuotient Blog
EXPERTS SHARING THEIR CYBER THREAT INTELLIGENCE INSIGHTS AND EXPERIENCESRhinos in San Francisco?? Come see the ThreatQuotient Crash at RSA 2017
Come meet with our CTI experts to discuss how you can empower your teams with their own threat operations and management program!
Expiration [Entry-Level Deprecation]
Expiration Tier I is the “entry-level” strategy taking two critical factors into consideration including Source and Indicator Type…
Need to get out of the office? Swing by Suits and Spooks DC!!
This week the ThreatQuotient team will be at Suits and Spooks DC held at the CEB Waterview Conference Center!
Investigating Spear phish Incidents with ThreatQ: Part 2
In this article, we will use the ThreatQ platform to investigate the site and learn more about what it may be hosting and, thus, what may have been downloaded.
Examining Ricochet Effects of Spear phishing Campaigns
There are many ways your organization can be affected by a spearphishing attack beyond the obvious – being the direct target.
Investigating Spear Phish Incidents with ThreatQ: Part 1
Spear phishing is a form of social engineering and undoubtedly one of the most successful and prolific attack vectors an adversary will use to compromise a target.
ThreatQ's "Signature" Difference
ThreatQ stands apart – providing an advanced way to process signature content that turns threat data into intelligence that is actionable.
Cyber Threat Intelligence Webcast: Hurricanes and Earthquakes
The key question covered in the Couch’s talk is how will organizations need to adapt to make the most use of this knowledge within security operations.
Situational Awareness vs. Situational Understanding – is intelligence passing you by?
The value of situational understanding is becoming more intimate with your adversary, your network, and your defenses.
Crashing into New Orleans, Speaking at MISTI Threat Intelligence Summit
Global Director of Threat Intelligence Engineering, Chris Jacob, will be speaking at the New Orleans Threat Intelligence Summit hosted by MISTI Training Institute.
Simpler, not Simple, Security
I’ve come to a realization: You cannot group security capabilities or maturity in a sizing model.
Flipping TQ on its back as a File Integrity Management System to Discover Webshells
TQ isn’t a SIEM but by twisting its usage it can be used as an innovative file integrity management system…
It’s beginning to look a lot like Phishing Season
“It’s that time of the year to talk with the wife and extended family about opening tracking emails again.”
Unfortunate Loss of Early ThreatQuotient Investor & Dear Friend, NEA’s Harry Weller
Harry was a friend and a brilliant mentor, not only to me but also to my colleagues at ThreatQuotient
Unfortunate Loss of Early ThreatQuotient Investor & Dear Friend, NEA's Harry Weller
Harry was a friend and a brilliant mentor, not only to me but also to my colleagues at ThreatQuotient
“Crashing” through preconceived notions about TIPs – Announcing ThreatQ v2
“Crashing” through preconceived notions about TIPs – Announcing ThreatQ v2
CyberMaryland Panel Illuminates the Dark Web
At the CyberMD Conf., I had the pleasure of participating in a panel discussion, “Shedding Light on the Dark Web…”
One year Anniversary? Try this on for size!
Paper is the traditional one year anniversary gift. The modern gift is a clock. At ThreatQuotient you get a really cool jacket….