BlogEXPERTS SHARING THEIR CYBER THREAT INTELLIGENCE INSIGHTS AND EXPERIENCES
In Part 1 of this series I landed on a recalibrated definition of incident pruning. Now, I want to demonstrate how ThreatQ Investigations can handle both incident thinning and incident deadheading methodologies.
We are extremely proud to announce that ThreatQuotient was named McAfee’s 2019 Security Innovation Alliance (SIA) Global Partner of the Year.
I am honored to announce that earlier this week, ThreatQuotient was named the winner of the inaugural Northern Virginia Technology Council (NVTC) Capital Cyber Awards.
Incident response investigations are complex efforts, shifting between chaos and order, as the incident lead maintains investigation alignment with IR policies, while the team chases down every possible clue leaving no stone unturned.
Gartner projects “by the end of 2022, 30% of organizations with a security team larger than five people will leverage SOAR tools in their security operations, up from less than 5% today.
ThreatQuotient is pleased to announce that we’re an official supporter of another organization called Helping Rhinos.
A mature threat hunting capability should automate the process of collecting intelligence and searching for atomic IoCs, like discrete IP addresses, domains and file hashes.
Headlines about attacks on critical infrastructures are quickly portrayed as a sensation. It is often difficult to find the facts behind the report and to understand the impact of a large-scale cyber campaign on the business.
MITRE ATT&CK dives deep into adversaries’ actions so security analysts can use that information to their advantage. It is a huge step forward in creating a knowledgebase of adversaries and associated TTPs.
When a threat arises, the security team role is to investigate and determine the reality of an attack and its severity.
In preparation for Black Hat USA next week in Las Vegas, I reviewed the results from the new 2019 Black Hat Attendee Survey. The survey takes the pulse of 345 security professionals who have attended or plan to attend Black Hat USA.
Threat hunting, the act of proactively searching for the existence of indicators of compromise within your environment, is a hot topic.
ThreatQuotient has been named to CRN’s Emerging Vendors list. The list recognizes new, rapidly growing companies that are leading in the area of IT innovation.
SlashNext and ThreatQuotient have partnered to integrate SlashNext Real-Time Phishing Threat Intelligence with the ThreatQ platform.
What problems are we trying to solve in today’s Security Operations Center (SOC)? If you get right to the point, there are many inefficiencies in processes, which result in delayed detection and response times.
This year’s survey focuses on how and why CTI is being used, how it is helping defenders, what data sources are being leveraged, and how data is converted into usable intelligence.
Over the last year, we have seen the cyber threat intelligence (CTI) community growing and diversifying; as a result, the way threat intelligence is being used has also evolved.
In no industry is the subjective perception of security as important as in the field of finance. Both private users and large customers are increasingly handling transactions online.