ThreatQuotient
Follow
75 Followers
Follow ThreatQuotient on their other social channels!
About Us
Founded:
2013
Company Size:
51-200 employees
Company Type:
Private
Location:
Washington, DC / USA
Website:
ThreatQuotient™ understands that the foundation of intelligence-driven security is people. The company’s open and extensible threat intelligence platform, ThreatQ, provides defenders with the context, customization and collaboration needed to ensure that intelligence is accurate, relevant and ti ...
Read more
Promoted Content
Learn more about ThreatQuotient and the ThreatQ Platform
Follow
Timeline Analysis to Identify Campaign Attacks
Timeline Analysis to Identify Campaign Attacks POSTED BY RYAN TROST Building from our previous spearphish investigation, let’s continue to dissect the robertwanger [at] aol.com spearphish attacks.   Hypothesis – The six targeted spearphish attacks are split into several orchestrated campaigns ...
Follow
Combatting daily security threats within the healthcare sector
Last year, we saw one of the most aggressive ransomware attacks on healthcare institutions around the world. WannaCry went viral on 12th May, causing widespread disruption to global IT systems and raising serious questions about the preparedness of the National Health Service to deal with such incidents. Read More> The post Combatting daily security threats within the healthcare sector appeared first on ThreatQuotient.
Follow
Dragos Makes Critical ICS Threat Intelligence More Accessible to Cybersecurity Community with New Pa
Dragos, Inc., the trusted leader in industrial threat detection and response technology and services, announced today that its industrial control system (ICS) specific threat intelligence product, WorldView, will integrate with partner companies. READ MORE> The post Dragos Makes Critical ICS Threat Intelligence More Accessible to Cybersecurity Community with New Partner Integrations appeared first on ThreatQuotient.
Follow
I Hate this Cliché, but I’m Going There
I really do not want to do this. I really do not want to use this quote, as it has been referenced hundreds of times too many already. But alas, I feel compelled to use it, as it is the best way to make my point…sigh. “If you know the enemy and know yourself, you need not fear the results of a hundred battles.” – Sun Tzu, The Art of War Read More> The post I Hate this Cliché, but I’m Going There appeared first on ThreatQuotient.
Follow
ZeroFOX Announces TIP Integrations Providing Comprehensive Social Media Security Coverage
ZeroFOX, the social media and digital security category leader, today unveiled new threat intelligence platform integrations enabling customers to better prevent, detect, respond to and recover from social media-based threats. By integrating ZeroFOX with TIPs and SIEMs, ZeroFOX bridges the gap for customers between social media and the larger threat landscape. READ MORE> The post ZeroFOX Announces TIP Integrations Providing Comprehensive Social Media Security Coverage appeared first on T ...
Follow
#WheresTQRhino at Black Hat USA
#WheresTQRhino at Black Hat USA POSTED BY THREATQ In a few days, security professionals from all over the globe will travel to Las Vegas for what is known in the industry as “Hacker Summer Camp”: Black Hat USA and DEF CON.  With last year’s event attracting a record-breaking number of a ...
Follow
ThreatQuotient Stands Out for Security on CRN’s 2018 Emerging Technology Vendors List
For Third Consecutive Year, Growing Threat Alliance Program (TAP) Instills Confidence in Go to Market Partners Seeking a Leader in the Security Operations and Threat Intelligence Platform Space Reston, VA – July 23, 2018 – ThreatQuotient, a trusted threat intelligence platform innovator, today announced that CRN®, a brand of The Channel Company, has named ThreatQuotient to its Emerging Vendors List for the third consecutive year. CRN’s annual list recognizes companies found ...
Follow
Victimology: Target Association
Victimology: Target Association POSTED BY RYAN TROST In a previous life, I managed two SOCs with 40+ analysts each, where a large component of the team was dedicated to threat intelligence, more specifically victimology. Admittedly I am by no means an expert at victimology. However, surrounded by several coll ...
Follow
Five Steps to Security Automation
Let’s face it, we’ve talked about security automation for years. We’ve grappled with what, when and how to automate. We’ve debated the human vs machine topic. And at certain points, when we’ve been “burned” (automatically shutting down systems in error), we’ve wondered if there’s any place at all for automation.   Read More The post Five Steps to Security Automation appeared first on ThreatQuotient.
Follow
Need Some Tips on TIPs?
Need Some Tips on TIPs? POSTED BY LIZ BUSH Check out our new Buyer’s Guide Is your organization one of the many that is in the process of establishing its own threat intelligence operations, building Security Operations Centers (SOCs), incident response (IR) capabilities and threat intelligence teams? ...

Our Revolution

We believe Cyber Security training should be free, for everyone, FOREVER. Everyone, everywhere, deserves the OPPORTUNITY to learn, begin and grow a career in this fascinating field. Therefore, Cybrary is a free community where people, companies and training come together to give everyone the ability to collaborate in an open source way that is revolutionizing the cyber security educational experience.

Cybrary On The Go

Get the Cybrary app for Android for online and offline viewing of our lessons.

Get it on Google Play
 

Support Cybrary

Donate Here to Get This Month's Donor Badge

 
Skip to toolbar

We recommend always using caution when following any link

Are you sure you want to continue?

Continue
Cancel