ThreatQuotient
Follow
39 Followers
Follow ThreatQuotient on their other social channels!
About Us
Founded:
2013
Company Size:
51-200 employees
Company Type:
Private
Location:
Washington, DC / USA
Website:
ThreatQuotient™ understands that the foundation of intelligence-driven security is people. The company’s open and extensible threat intelligence platform, ThreatQ, provides defenders with the context, customization and collaboration needed to ensure that intelligence is accurate, relevant and ti ...
Read more
Promoted Content
Learn more about ThreatQuotient and the ThreatQ Platform
Follow
11
Recorded Future Custom Connector updates for ThreatQ
Recorded Future Custom Connector updates for ThreatQ POSTED BY JULIAN DEFRONZO We have made significant changes to ThreatQ’s Recorded Future Custom Connector to support Recorded Future’s new API changes and additional risk lists. By pulling in additional data from the new risk lists, the ThreatQ threat library becomes more robust ...
Follow
Product Methodology: Operations vs. Sharing
Product Methodology: Operations vs. Sharing POSTED BY WAYNE CHIANG During the time when we were designing the initial phases of our threat intelligence platform (TIP), we determined that there were some important core principles that should drive how we built the product. One of these core tenets focused on the importance of building a platf ...
Follow
Product Methodology: Operations vs. Scoring
Product Methodology: Operations vs. Scoring POSTED BY WAYNE CHIANG During the time when we were designing the initial phases of our threat intelligence platform (TIP), we determined that there were some important core principles that should drive how we built the product. One of these core tenets focused on the importance of building a platf ...
Follow
Referral Partner Program
Referral Partner Program POSTED BY FARAZ SIRAJ In today’s fast paced security landscape, customers are doing their best to keep their infrastructure secure from the latest breaches and threats.  In many circumstances, companies do not have the manpower or resources to seek out and identify the latest advancements in technology to ...
Follow
Use Threat Intelligence to “Unfragment” Security
It turns out that threat intelligence can be the best glue to integrate layers of point products within a defense-in-depth strategy and reduce fragmentation. Read More. The post Use Threat Intelligence to “Unfragment” Security appeared first on ThreatQuotient.
Follow
Blanket Deployment of Intelligence is Counterproductive
Blanket Deployment of Intelligence is Counterproductive POSTED BY RYAN TROST One of the core workflows within SOC/CIRT Teams these days is automatically consuming intelligence in the form of indicators and deploying them to detection technologies. It seems really easy and simplistic, but it also encompasses one of my biggest operational pet ...
Follow
Come See ThreatQuotient Next Week at SANS THIR
Come See ThreatQuotient Next Week at SANS THIR POSTED BY THREATQ If you’ll be in New Orleans next week, take some time and stop by SANS Threat Hunting and Incident Response Summit. This summit will focus specifically on hunting and response techniques and capabilities that can be used to identify, contain and eliminate adversaries targ ...
Follow
To Optimize Threat Operations, Start with Customized Scoring
To Optimize Threat Operations, Start with Customized Scoring POSTED BY RYAN TROST Did you know that the threat scores intelligence providers and “blackbox” TIPs provide are generic, global risk scores? They aren’t specific to your company, or even your vertical. That’s one of the reasons why teams can end up wasting a ...
Follow
28
Project Honey Maid: Using ThreatQ to Research NoSQL Ransomware Attacks
Project Honey Maid: Using ThreatQ to Research NoSQL Ransomware Attacks POSTED BY JULIAN DEFRONZO Part I: MongoDB   Over the past few months, there has been a rise in ransomware-like attacks against many popular NoSQL databases, including MongoDB, Elasticsearch, and Redis. Many, if not all, of these attacks leverage insecure default conf ...
Follow
Bridging the Gap: Come See the ThreatQuotient Team at SINET ITSEF 2017
Bridging the Gap: Come See the ThreatQuotient Team at SINET ITSEF 2017 POSTED BY THREATQ The ThreatQuotient crash is taking on SINET ITSEF this week in Mountain View, CA.   We know a few things about cyber threat intelligence (CTI) and threat intelligence platforms.  Sometimes the term ‘threat intelligence’ can be overu ...

Our Revolution

We believe Cyber Security training should be free, for everyone, FOREVER. Everyone, everywhere, deserves the OPPORTUNITY to learn, begin and grow a career in this fascinating field. Therefore, Cybrary is a free community where people, companies and training come together to give everyone the ability to collaborate in an open source way that is revolutionizing the cyber security educational experience.

Cybrary On The Go

Get the Cybrary app for Android for online and offline viewing of our lessons.

Get it on Google Play
 

Support Cybrary

Donate Here to Get This Month's Donor Badge

 
Skip to toolbar
Cybrary works best if you switch to our Android-friendly app
Continue

We recommend always using caution when following any link

Are you sure you want to continue?

Continue
Cancel