by ThreatQ | Apr 25, 2017 | Blog, Corporate, Cybersecurity
Preparing for FS-ISAC Annual Summit: Financial Threat Actors are on the Rise POSTED BY THREATQ As the threat landscape continues to evolve, threat actors continue to target large corporations across all industries. However, in recent years there has been a clear...
by Julian DeFronzo | Apr 20, 2017 | Blog, Threat Intelligence
Recorded Future Custom Connector updates for ThreatQ POSTED BY JULIAN DEFRONZO We have made significant changes to ThreatQ’s Recorded Future Custom Connector to support Recorded Future’s new API changes and additional risk lists. By pulling in additional data from the...
by Wayne Chiang | Apr 18, 2017 | Blog, Threat Intelligence
Product Methodology: Operations vs. Sharing POSTED BY WAYNE CHIANG During the time when we were designing the initial phases of our threat intelligence platform (TIP), we determined that there were some important core principles that should drive how we built the...
by Liz Bush | Apr 13, 2017 | Blog, Corporate
Referral Partner Program POSTED BY FARAZ SIRAJ In today’s fast paced security landscape, customers are doing their best to keep their infrastructure secure from the latest breaches and threats. In many circumstances, companies do not have the manpower or resources to...
by Ryan Trost | Apr 11, 2017 | Blog, Threat Intelligence
Blanket Deployment of Intelligence is Counterproductive POSTED BY RYAN TROST One of the core workflows within SOC/CIRT Teams these days is automatically consuming intelligence in the form of indicators and deploying them to detection technologies. It seems really easy...