BlogEXPERTS SHARING THEIR CYBER THREAT INTELLIGENCE INSIGHTS AND EXPERIENCES
How do you solve the problem of bringing together data from multiple sources, contextualize, prioritize and remove noise?
The acronym stands for Observe, Orient, Decide and Act, and if you can go through this decision cycle faster than your adversary, you can defeat them.
The new SANS 2021 Report, Top Skills Analysts Need to Master analyzes the need for organizations to invest in improving their security operations and identifies the skills analysts must master.
As organizations evolve their security operations and the SOC increasingly focuses on detection and response, three capabilities are foundational for success – threat intelligence, integration and automation.
We all know the security industry mantra: it’s not a matter of if, but when and how we’ll be attacked.
On the heels of announcing the closing of $22.5 million in new financing as a result of strong performance in 2020, I’m proud of our team’s latest innovation that we’re announcing today, ThreatQ TDR Orchestrator.
Organizations are looking to improve their security operations effectiveness, efficiency, and staff satisfaction, with Security, Orchestration, Automation and Response (SOAR).
The spike in cyber breaches in the past year, compounded by COVID-related attacks, has only increased the importance of cyber threat intelligence (CTI).
The beginning of the year is always full of “bests and worsts” from the prior year, as well as predictions.
March is Women’s History Month and today is International Women’s Day with this year’s theme being “choose to challenge.” At ThreatQuotient, we’re celebrating with a month-long recognition of women in cybersecurity.
As a woman in security, it’s hard not to notice the gender imbalance.
In recent years threat hunting has become much more widely adopted, but today the definition of threat hunting is still quite a controversial topic.
When an entire company decides to collectively embrace telework at the same time, over an extended period of time, the result is that business processes must change.
The SANS 2021 Cyber Threat Intelligence (CTI) Survey is now available and, not surprising given the events of last year, the theme of “resilience” comes through loud and clear.
The ThreatQ Platform can help bridge the threat hunting skills gap. It provides a single, collaborative environment that can include threat hunters, incident handlers and threat intelligence and SOC analysts.
The usefulness of the MITRE ATT&CK framework depends on whether it is implemented effectively and whether security managers have the ability to aggregate and analyze the data in a simple way.
At ThreatQuotient, we believe you cannot defend against what you do not understand, so threat intelligence is critical to ensure a SOAR platform is using the right data to execute the right actions.
The mapping of the MITRE framework data, summarized as threat information, is ultimately one of the main activities that an IT security department will undertake.