The ThreatQuotient Blog
EXPERTS SHARING THEIR CYBER THREAT INTELLIGENCE INSIGHTS AND EXPERIENCESOne year Anniversary? Try this on for size!
Paper is the traditional one year anniversary gift. The modern gift is a clock. At ThreatQuotient you get a really cool jacket….
Alert Fatigue – “Paralysis by Analysis”
I was recently chatting with a friend who runs a SOC in the UK and our conversation turned to one of his constant challenges – “alert fatigue.”
Cybersecurity Visionary, Martin Roesch, Joins Our Board
At ThreatQuotient we believe that the foundation of intelligence-driven security is people. We built ThreatQ, our open and extensible….
Sweet 16: ThreatQuotient Wins SINET 16 Innovator Award
We’re honored that ThreatQuotient is one of this year’s winners of the SINET 16 Innovators Award.
Using ThreatQuotient to Discover and Prevent POS Malware
Threat intelligence can strengthen a retailer’s ability to detect the presence of POS malware operating in the network…
Our Fast-Paced Journey Continues
Today we’re announcing that we’ve secured $12 million in Series B funding, led by New Enterprise Associates (NEA)…
Takeaway from Vegas: Threat Intelligence is Maturing
If you have anything to do with cybersecurity, chances are you were in Las Vegas earlier this month for Black Hat…
What makes the Olympics stand out, allows attacks to play out
On the heels of U.S. presidential campaigning and the U.K. leaving the European Union, all eyes have shifted to the 2016 Olympics Games in Rio…
“TIPs” to Address Black Hat Attendees’ Concerns
In anticipation of Black Hat next week in Las Vegas, the results from the 2016 Black Hat Attendee Survey are in…
First things First: Define Your Threat Intelligence Program
There are a few more steps along the way to operationalizing threat intelligence, but it begins with a solid threat intelligence program.
TIP vs. SIEM vs. Ticketing System – Part 2
Now let’s take a closer look at the limitations of Ticketing Systems to handle threat intelligence and why a Threat Intelligence Platform…
TIP vs. SIEM vs. Ticketing System – Part 1
Given the volume of indicators published daily and the volume of log data available, you’re fooling yourself if you think you can…
Core Functions of a Threat Intelligence Platform — Part 2: Enriching Threat Intelligence
So you’ve used your Threat Intelligence Platform to wrangle the herd of data feeds into something manageable…
Being Part of What’s Next in Threat Intelligence
Now it seems that everyone is talking about threat intelligence. Nearly every security vendor wants to get in on the action.
What can you do in 90 days?
Try ThreatQ for free and see how to use threat intelligence effectively in your organization.
Inside the SOC: Making The Most of Cyber Threat Intelligence
Today, Cyber Threat Intelligence has evolved since its humble beginnings. There are a number of standards…
Core Functions of a Threat Intelligence Platform – Part 1: Intelligence Aggregation
Inside a Security Operations Center (SoC), a Threat Intelligence Platform (TIP) has core functions…
IT-Harvest’s 2016 Video Interview
Richard Stiennon interviews John Czupak, President & CEO, and Ryan Trost, CTO & Co-founder of ThreatQuotient, as part of IT-Harvest’s 2016 Video Interview Series.