ThreatQuotient
Follow
49 Followers
Follow ThreatQuotient on their other social channels!
About Us
Founded:
2013
Company Size:
51-200 employees
Company Type:
Private
Location:
Washington, DC / USA
Website:
ThreatQuotient™ understands that the foundation of intelligence-driven security is people. The company’s open and extensible threat intelligence platform, ThreatQ, provides defenders with the context, customization and collaboration needed to ensure that intelligence is accurate, relevant and ti ...
Read more
Promoted Content
Learn more about ThreatQuotient and the ThreatQ Platform
Follow
28
One of These Things Is Not Like the Other – Defending Against Homograph Attacks
One of These Things Is Not Like the Other - Defending Against Homograph Attacks POSTED BY JULIAN DEFRONZO Recently there has been an increase in homograph attacks. These attacks take advantage of certain Unicode characters that look very similar to certain ASCII characters and use a similar-looking name to a more established domain to fool a ...
Follow
Using History to Overcome the Challenge of Threat Intelligence Data Overload
Applying Unfiltered Threat Intelligence to Defenses Generates Significant False Positives Read More. The post Using History to Overcome the Challenge of Threat Intelligence Data Overload appeared first on ThreatQuotient.
Follow
23
Using Threat Intelligence to Defend Against 0day Vulnerabilities
Using Threat Intelligence to Defend Against 0day Vulnerabilities POSTED BY YANN LEBORGNE Last month, a new 0day (CVE 2017-0199) was reported in the news. It was publicized in conjunction with a well-known malware which was dormant for a good number of months. As it is not common to have 0days reported in cybercrime operations (they are much ...
Follow
Cybersecurity in an IoT and mobile world: The key trends
“Internet of Things is the ‘thing’ right now — it used to be cloud, then it was mobile. In four or five years from now, it’ll be something else.” – Jonathan Couch Read More. The post Cybersecurity in an IoT and mobile world: The key trends appeared first on ThreatQuotient.
Follow
Ransomware – The Non-Technical But Fascinating Ripple
Ransomware - The Non-Technical But Fascinating Ripple POSTED BY RYAN TROST One of the silver-lining effects of a global cyber scare such as WannaCry ransomware is the trigger to catch up with friends to discuss fact vs. fiction of the threat research, attribution, remediation, and other ‘bigger picture’ observations.  I rece ...
Follow
ThreatQuotient Takes Gold for Best IT Software and Hottest Company in 2017 IT World Awards
Open and extensible threat intelligence platform recognized for providing customers with a cornerstone solution for efficient threat operations   Reston, VA – May 25, 2017 – ThreatQuotient™, a trusted threat intelligence platform innovator, today announced that they have been named the winner of four Network Products Guide 2017 IT World Awards®. The company and its threat intelligence platform, ThreatQ, were awarded Gold for Best IT Software and Hottest Company, as we ...
Follow
Buy vs. Build: Tales from the Trenches
Buy vs. Build: Tales from the Trenches POSTED BY RYAN TROST In mid-2010 I was running a large Defense contractor SOC (35+ analysts) and was forced to build what’s currently known as a threat intelligence platform (TIP) – to manage indicators, adversary profiles, spearphish trends, and team commentary/annotations.  I didn&rsq ...
Follow
Americans Want More Say in the Privacy of Personal Data
CR’s second Consumer Voices Survey reveals deep concerns about how info is collected and used. Read More. The post Americans Want More Say in the Privacy of Personal Data appeared first on ThreatQuotient.
Follow
43
It’s Time to Think Differently about Threat Operations
It’s Time to Think Differently about Threat Operations POSTED BY THREATQ Can you really “manage” threats? Is that even a worthwhile goal? And how do you define a threat? New research by Securosis explores why the current approach of treating every attack as an independent event and defaulting to the traditional threat mana ...
Follow
An Intelligent Approach to Cure Security Fatigue
Late last year, a study by the US National Institute of Standards and Technology (NIST) took an in-depth look at a phenomenon called “security fatigue.” Read More. The post An Intelligent Approach to Cure Security Fatigue appeared first on ThreatQuotient.

Our Revolution

We believe Cyber Security training should be free, for everyone, FOREVER. Everyone, everywhere, deserves the OPPORTUNITY to learn, begin and grow a career in this fascinating field. Therefore, Cybrary is a free community where people, companies and training come together to give everyone the ability to collaborate in an open source way that is revolutionizing the cyber security educational experience.

Cybrary On The Go

Get the Cybrary app for Android for online and offline viewing of our lessons.

Get it on Google Play
 

Support Cybrary

Donate Here to Get This Month's Donor Badge

 

Cybrary|0P3N

Free Solution For OST to PST
Views: 188 / June 22, 2017
Your Complete Guide to VMware
Views: 182 / June 22, 2017
Collecting Firewall and Router Logs
Views: 156 / June 22, 2017
Your Complete Guide to Wireshark
Views: 3502 / June 21, 2017
Skip to toolbar
Cybrary works best if you switch to our Android-friendly app
Continue

We recommend always using caution when following any link

Are you sure you want to continue?

Continue
Cancel