BlogEXPERTS SHARING THEIR CYBER THREAT INTELLIGENCE INSIGHTS AND EXPERIENCES
Given that threat hunting is still in its early stages for most companies and teams are relatively small, organizations need to think creatively about how to structure security operations teams and processes to help threat hunters work efficiently.
Threat hunting, the act of proactively searching for the existence of indicators of compromise within your environment, is a hot topic.
ThreatQuotient has been named to CRN’s Emerging Vendors list. The list recognizes new, rapidly growing companies that are leading in the area of IT innovation.
SlashNext and ThreatQuotient have partnered to integrate SlashNext Real-Time Phishing Threat Intelligence with the ThreatQ platform.
What problems are we trying to solve in today’s Security Operations Center (SOC)? If you get right to the point, there are many inefficiencies in processes, which result in delayed detection and response times.
This year’s survey focuses on how and why CTI is being used, how it is helping defenders, what data sources are being leveraged, and how data is converted into usable intelligence.
Over the last year, we have seen the cyber threat intelligence (CTI) community growing and diversifying; as a result, the way threat intelligence is being used has also evolved.
In no industry is the subjective perception of security as important as in the field of finance. Both private users and large customers are increasingly handling transactions online.
ThreatQ can be a central repository for the intelligence reports analysts produce, allowing the information to link object types, be searched and act as a knowledge base for analysts and security teams.
MITRE ATT&CK is a tool that allows you to get a structured and detailed understanding of your opponents’ game strategies.
The security industry has talked for years about the importance of vulnerability management as a basic security measure to prevent attacks.
Proactivity is now seen by security teams as a viable solution to the challenge of defending enterprises against the ever-growing threat landscape.
To overcome the alert triage challenge, analysts need a way to efficiently and accurately go through alerts to determine which ones matter most and require human attention and eliminate the ones that do not.
Three out of four banking customers surveyed agree or strongly agree that social media is important to their banks, with Facebook, LinkedIn, Twitter, YouTube and Instagram being the most popular platforms.
It’s also important to remember that threat hunting must be a continuous process. As new data and learnings are added to the central repository, intelligence is reprioritized to support ongoing hunts.
ThreatQ provides flexibility in how you deploy and use the platform to meet your specific security and environment requirements.
Nearly every organization is interested in using MITRE ATT&CK, but they have different views on how it should be adopted based their capabilities.
To improve vulnerability management, you need the ability to focus your resources on addressing the known security weaknesses in your environment.
The security industry is placing greater emphasis on technologies, tools and processes that accelerate detection and response. One of the most interesting to come on the scene lately is the MITRE ATT&CK Frameworks™