The ThreatQuotient Blog
EXPERTS SHARING THEIR CYBER THREAT INTELLIGENCE INSIGHTS AND EXPERIENCESIt’s beginning to look a lot like Phishing Season
“It’s that time of the year to talk with the wife and extended family about opening tracking emails again.”
Unfortunate Loss of Early ThreatQuotient Investor & Dear Friend, NEA’s Harry Weller
Harry was a friend and a brilliant mentor, not only to me but also to my colleagues at ThreatQuotient
Unfortunate Loss of Early ThreatQuotient Investor & Dear Friend, NEA's Harry Weller
Harry was a friend and a brilliant mentor, not only to me but also to my colleagues at ThreatQuotient
“Crashing” through preconceived notions about TIPs – Announcing ThreatQ v2
“Crashing” through preconceived notions about TIPs – Announcing ThreatQ v2
CyberMaryland Panel Illuminates the Dark Web
At the CyberMD Conf., I had the pleasure of participating in a panel discussion, “Shedding Light on the Dark Web…”
One year Anniversary? Try this on for size!
Paper is the traditional one year anniversary gift. The modern gift is a clock. At ThreatQuotient you get a really cool jacket….
Alert Fatigue – “Paralysis by Analysis”
I was recently chatting with a friend who runs a SOC in the UK and our conversation turned to one of his constant challenges – “alert fatigue.”
Cybersecurity Visionary, Martin Roesch, Joins Our Board
At ThreatQuotient we believe that the foundation of intelligence-driven security is people. We built ThreatQ, our open and extensible….
Sweet 16: ThreatQuotient Wins SINET 16 Innovator Award
We’re honored that ThreatQuotient is one of this year’s winners of the SINET 16 Innovators Award.
Using ThreatQuotient to Discover and Prevent POS Malware
Threat intelligence can strengthen a retailer’s ability to detect the presence of POS malware operating in the network…
Our Fast-Paced Journey Continues
Today we’re announcing that we’ve secured $12 million in Series B funding, led by New Enterprise Associates (NEA)…
Takeaway from Vegas: Threat Intelligence is Maturing
If you have anything to do with cybersecurity, chances are you were in Las Vegas earlier this month for Black Hat…
What makes the Olympics stand out, allows attacks to play out
On the heels of U.S. presidential campaigning and the U.K. leaving the European Union, all eyes have shifted to the 2016 Olympics Games in Rio…
“TIPs” to Address Black Hat Attendees’ Concerns
In anticipation of Black Hat next week in Las Vegas, the results from the 2016 Black Hat Attendee Survey are in…
First things First: Define Your Threat Intelligence Program
There are a few more steps along the way to operationalizing threat intelligence, but it begins with a solid threat intelligence program.
TIP vs. SIEM vs. Ticketing System – Part 2
Now let’s take a closer look at the limitations of Ticketing Systems to handle threat intelligence and why a Threat Intelligence Platform…
TIP vs. SIEM vs. Ticketing System – Part 1
Given the volume of indicators published daily and the volume of log data available, you’re fooling yourself if you think you can…
Core Functions of a Threat Intelligence Platform — Part 2: Enriching Threat Intelligence
So you’ve used your Threat Intelligence Platform to wrangle the herd of data feeds into something manageable…