by Marc Solomon | Feb 28, 2019 | Media Coverage
As a security professional, wouldn’t it be great to be able to focus on one thing at a time and know you’re focused on the right things to protect the organization? Often, the day begins with a set of system notifications pointing us in the direction of alerts to...
by Ryan Trost | Feb 26, 2019 | Blog, Cybersecurity, Threat Intelligence
TLP Inheritance - a minor but powerful feature POSTED BY RYAN TROST Traffic Light Protocol (TLP) is a pretty universal term these days, especially as STIX/TAXII is gaining momentum within the *-ISAC communities. However, for completeness its a sensitivity marking term...
by ThreatQ | Feb 20, 2019 | Media Coverage, News
ThreatQ and ThreatQ Investigations Stand Out for Excellence in Improving Collaboration, Accelerating Shared Understanding and Coordinating Response Across Cybersecurity Teams Reston, VA – Feb. 20, 2019 – ThreatQuotient™, a leading security operations platform...
by Michel Huffaker | Feb 19, 2019 | Media Coverage
With cyberattacks becoming an all-too-common occurrence, the question of who is responsible for prevention has started to evolve. Cybersecurity efforts have traditionally been the responsibility of the organizations and financial institutions that hold data, but with...
by Liz Bush | Feb 12, 2019 | Blog, Cybersecurity, Threat Intelligence
How ThreatQ and ThreatQ Investigations work with Endpoint Detection & Response (EDR) Systems POSTED BY LIZ BUSH For decades, cyber technologies have been built for the common purpose of detecting and blocking threats. When a new type of threat appeared, companies...