ThreatQuotient
Follow
56 Followers
Follow ThreatQuotient on their other social channels!
About Us
Founded:
2013
Company Size:
51-200 employees
Company Type:
Private
Location:
Washington, DC / USA
Website:
ThreatQuotient™ understands that the foundation of intelligence-driven security is people. The company’s open and extensible threat intelligence platform, ThreatQ, provides defenders with the context, customization and collaboration needed to ensure that intelligence is accurate, relevant and ti ...
Read more
Promoted Content
Learn more about ThreatQuotient and the ThreatQ Platform
Follow
8
Integrating Wapack Labs CTAC with ThreatQ
Integrating Wapack Labs CTAC with ThreatQ POSTED BY MIKE CLARK The Cyber Threat Analysis Center (CTAC) from Wapack Labs is an interesting offering. What makes this service special among Threat Intelligence providers is the level of access given to customers. Most threat intelligence providers just offer curated intelligence, meaning threat d ...
Follow
To Manage Risk Understand Adversaries, Not Just Activity in Your Environment
Six years ago the US National Institute of Standards and Technology (NIST) put forth a framework for information security continuous monitoring (ISCM), defined as maintaining ongoing awareness of information security, vulnerabilities and threats to support organizational risk management decisions.Read More. The post To Manage Risk Understand Adversaries, Not Just Activity in Your Environment appeared first on ThreatQuotient.
Follow
350% more cybersecurity pros in Washington, D.C., area than rest of U.S.
Now Ackerman is dropping a line in the Washington, D.C., Beltway waters. His phish-finder says there’s 350 percent more cyber engineers and analysts in that area than the rest of the U.S. combined. Read More. The post 350% more cybersecurity pros in Washington, D.C., area than rest of U.S. appeared first on ThreatQuotient.
Follow
Major Take-Aways from Black Hat USA
Major Take-Aways from Black Hat USA POSTED BY THREATQ The city of Las Vegas, NV is famed for its 24-hour casinos, themed hotels with elaborate displays & Elvis-officiated weddings, bringing in approximately 3.5M visitors per month.  Despite the dry heat of the Mojave Desert, Las Vegas is also home to one of the world’s leading ...
Follow
Data Breach Trends
And while the hackers behind WannaCry didn’t make a great deal of money from the ransomware—CNBC estimated they made about $50,000 in Bitcoin in May—the way the malware spread was concerning for future attacks, says Jonathan Couch, senior vice president of strategy at ThreatQuotient, a threat intelligence platform. Read More. The post Data Breach Trends appeared first on ThreatQuotient.
Follow
Stepping out of my Comfort Zone
Stepping out of my Comfort Zone POSTED BY JOHN CZUPAK Ask me to talk about cybersecurity and ThreatQuotient and I’m in my comfort zone. As a career cyber startup executive, I can talk for hours about the challenges organizations face as the threat landscape accelerates and gets increasingly complex. And I get excited explaining how Thr ...
Follow
ThreatQuotient Appoints Gigi Schumm as SVP World Wide Sales
Schumm brings 25+ years of industry expertise to help accelerate sales momentum   Reston, Virginia  – August 2, 2017–ThreatQuotient™, a trusted threat intelligence platform innovator, today announced that Gigi Schumm has joined the company’s executive management team as Senior Vice President of World Wide Sales. Schumm is a recognized leader in the security industry with a proven track record of building teams and exceeding revenue and margin goals. In thi ...
Follow
32
Using ThreatQ and Blueliv to Gain Greater Insights and Prioritize Threats
Using ThreatQ and Blueliv to Gain Greater Insights and Prioritize Threats POSTED BY ZACH SHAMES In this day and age, almost every device is a potential target for some form of malicious attack. In this post, we will take a look at the intelligence that Blueliv Threat Intelligence Feed provides in order to help combat these attacks. Blueliv p ...
Follow
96
One of These Things Is Not Like the Other – Defending Against Homograph Attacks
One of These Things Is Not Like the Other - Defending Against Homograph Attacks POSTED BY JULIAN DEFRONZO Recently there has been an increase in homograph attacks. These attacks take advantage of certain Unicode characters that look very similar to certain ASCII characters and use a similar-looking name to a more established domain to fool a ...
Follow
Using History to Overcome the Challenge of Threat Intelligence Data Overload
Applying Unfiltered Threat Intelligence to Defenses Generates Significant False Positives Read More. The post Using History to Overcome the Challenge of Threat Intelligence Data Overload appeared first on ThreatQuotient.

Our Revolution

We believe Cyber Security training should be free, for everyone, FOREVER. Everyone, everywhere, deserves the OPPORTUNITY to learn, begin and grow a career in this fascinating field. Therefore, Cybrary is a free community where people, companies and training come together to give everyone the ability to collaborate in an open source way that is revolutionizing the cyber security educational experience.

Cybrary On The Go

Get the Cybrary app for Android for online and offline viewing of our lessons.

Get it on Google Play
 

Support Cybrary

Donate Here to Get This Month's Donor Badge

 
Skip to toolbar
Cybrary works best if you switch to our Android-friendly app
Continue

We recommend always using caution when following any link

Are you sure you want to continue?

Continue
Cancel