The butler didn’t do it, so who did?

Share and earn Cybytes
Facebook Twitter LinkedIn Email

The butler didn’t do it, so who did?


If you’re anything like me, then you’re going to love this cyber investigation challenge we’ve put together for you. You see, when I was a kid, I wanted to be a detective.  Part of that was the influence of shows like Moonlighting, Magnum P.I. and Hill Street Blues but part of it was because I loved gathering clues to solve mysteries.

In college I worked as a criminal investigator.  As part of an investigative team, I would assign tasks for a particular case, gather evidence, and determine a timeline of events in order present a complete picture of the incident.

In hindsight, I was laying the foundation for a career in cybersecurity.   I love helping others find out “whodunit” and how to stop it. At ThreatQuotient, we have built a product that helps security operations teams investigate a suspicious event or incident and determine how to remediate it. ThreatQ Investigations is a cybersecurity situation room where teams collaborate and coordinate response.   They can visualize and document an incident together, allowing them to take action based on evidence much more quickly and with greater confidence. 

ThreatQ Investigations UI

ThreatQ Investigations User Interface

Going back to the detective show reference, I compare ThreatQ Investigation to those detective shows where multiple detectives work a case, all following clues and then coming together to add the relevant information to the evidence board and creating a timeline of the events.  Based on the evidence board and timeline, the head detective then assigns additional tasks for the detectives to pursue. As more information comes in, it is either thrown out if irrelevant or added to the board and timeline to complete the picture with the ultimate goal of finding out who did it.  In cybersecurity, we take it one step further and not only want to find out who did it, but how to stop it or prevent it in the future.

Like most products, it helps to see it and be able to interact with it to understand how it works. To demonstrate ThreatQ Investigations, we have put together a hands-on challenge where you can see the platform at work and test your cybersecurity investigation skills.  Maybe even win a prize while you’re at it!

Up to the challenge?  

Sign up to access ThreatQ Investigations and put on your detective hat!

The post The butler didn’t do it, so who did? appeared first on ThreatQuotient.

Share this post and earn Cybytes
Facebook Twitter LinkedIn Email
About ThreatQuotient
ThreatQuotient™ understands that the foundation of intelligence-driven security is people. The company’s open and extensible threat intelligence platform, ThreatQ, provides defenders with the context, customization and collaboration needed to ensure that intelligence is accurate, relevant and timely to their business. Leading global companies are using ThreatQ as the cornerstone of their threat operations and management system, increasing security effectiveness and efficiency. For more information, visit

Our Revolution

We believe Cyber Security training should be free, for everyone, FOREVER. Everyone, everywhere, deserves the OPPORTUNITY to learn, begin and grow a career in this fascinating field. Therefore, Cybrary is a free community where people, companies and training come together to give everyone the ability to collaborate in an open source way that is revolutionizing the cyber security educational experience.

Support Cybrary

Donate Here to Get This Month's Donor Badge


We recommend always using caution when following any link

Are you sure you want to continue?