ThreatQuotient

Reston, VA, USA
2013
Oct 14, 2021   |  By Ross Hammer
Over the last several months we’ve seen a tremendous uptick in cyberattacks. Nearly every day, news of another ransomware, supply chain or zero-day attack makes headline news. So, what can organizations do to mitigate risk? One major step forward to improve security operations is to effectively share curated threat intelligence.
Oct 12, 2021   |  By Noor Boulos
2020 was the year of the phish. Well, not officially. According to the Chinese Zodiac, 2020 was the Year of the Rat. But if you look at it from a cyberattack trends perspective, plenty of third parties reported a huge uptick in phishing attacks during 2020. The SANS 2021 Top New Attacks and Threat Report points to both the Microsoft Digital Defense Report 2020 and the 2021 Data Breach Investigations Report as key sources that validate phishing as the most common initial compromise vector.
Oct 7, 2021   |  By Kasey Ello
This month marks the 18th year of Cybersecurity Awareness Month (CSAM) which focuses on helping provide individuals with resources they need to stay safer and more secure online. Now, more than ever, the overarching theme “Do Your Part. #BeCyberSmart” should resonate with everyone.
Oct 5, 2021   |  By Celine Gajnik
ThreatQuotient’s new survey on the State of Cybersecurity Automation Adoption is now available for download. Conducted by independent research organization, Opinion Matters, the survey includes responses from 250 senior cybersecurity professionals representing the following industries: central government, defense, critical national infrastructure (energy and utilities), retail and financial services.
Sep 28, 2021   |  By Audrey Llorens
The escalation of cyberattacks since early 2020 is requiring many companies to strengthen their security operations. Adversaries are taking advantage of new attack vectors – like IoT devices, insecure remote access mechanisms, and the multiple personal and work devices users now move between. They’re also leveraging human vulnerabilities, impersonating trusted colleagues and third parties to infiltrate organizations.
Sep 14, 2021   |  By Noor Boulos
The SANS 2021 Automation and Integration Survey is now available for download, focusing on the question: First we walked, now we run – but should we? Let’s face it, we’ve talked about security automation for years. We’ve grappled with what, when and how to automate. We’ve debated the human vs machine topic.
Sep 7, 2021   |  By Cyrille Badeau
Many CISOs I speak with across Europe tell me their cybersecurity teams rely on two, primary open-source platforms within their security operations (SecOps). The first is Malware Information Sharing Platform (MISP), that allows the storing and sharing of indicators of compromise (IoCs) with other MISP users. The second is TheHive, designed for security incident response (IR).
Aug 31, 2021   |  By Marc Solomon
Extended Detection and Response (XDR) is the latest buzz word in the security industry and garnering significant attention. Industry analysts each have their own definition. Meanwhile, security vendors are quickly jumping on the bandwagon, recasting their products as XDR solutions. And it’s safe to assume many more will unveil XDR products in the months ahead.
Aug 24, 2021   |  By Patrick Declusin
In recent months, we’ve seen a sharp rise in software supply chain attacks that infect legitimate applications to distribute malware to users. SolarWinds, Codecov and Kesaya have all been victims of such attacks that went on to impact thousands of downstream businesses around the globe. Within minutes of these high-profile attacks making headline news, CEOs often ask: “Should we be concerned? How is it impacting us? What can we do to mitigate risk?” .
Aug 17, 2021   |  By Anthony Stitt
Every breach starts as a compromise that goes unnoticed and unactioned, often because existing security devices have too many events, too little context and cannot prioritize. Providing these systems with threat intelligence is the lowest cost and most effective way to improve contextualization and blocking of new attacks.
Aug 11, 2021   |  By ThreatQuotient
Learn how ThreatQ solves the challenges of security operations.
Jul 8, 2021   |  By ThreatQuotient
Behind marketing buzzwords, product pitches, and business cycles, the complex cybersecurity market often forgets about the force that makes our world turn: the people that are embedded within it. That’s why we’ve created a livestream series that isn’t a pitch or demo, but a highlight of a star player– whether it be a non-profit partner or SOC leader, who has a tale to tell.
Apr 27, 2021   |  By ThreatQuotient
Joel Bork, Jonathan Couch, and Christian Galladora dive into the ThreatQuotient Threat Intelligence and Investigative Platform to uncover the technical details and features that exist!
Mar 24, 2021   |  By ThreatQuotient
Behind marketing buzzwords, product pitches, and business cycles, the complex cybersecurity market often forgets about the force that makes our world turn: the people that are embedded within it. That’s why we’ve created a livestream series that isn’t a pitch or demo, but a highlight of a star player– whether it be a non-profit partner or SOC leader, who has a tale to tell.
Feb 18, 2021   |  By ThreatQuotient
See how ThreatQ's normalized data accelerates multiple partner integrations and improves searchable threats automatically with Cisco SecureX.
Feb 4, 2021   |  By ThreatQuotient
The New Year is here - but what does the future hold for the world of cybersecurity and threat intelligence? Aylea Baldwin, Threat Intelligence Lead, Reddit Jonathan Couch, SVP Strategy, ThreatQuotient Justin Henkel, Director, Cyber Threat Intelligence, CME Group Kurtis Minder, Chief Executive Officer, GroupSense
Feb 1, 2021   |  By ThreatQuotient
[January 28, 2021] Check out ThreatQuotient's Anthony Stitt with online news channel Ticker TV. This interview explored the vital role employees play and how organisations can empower their employees in identifying and reporting cyber threats while also exploring the value of gathering internal threat intelligence within an organisation.
Jan 20, 2021   |  By ThreatQuotient
Cyber Threat Intelligence - Top Gun Style by Markus Auer, CTI Advisor and Regional Manager, ThreatQuotient
Mar 25, 2020   |  By ThreatQuotient
Find out the inspiration for building the ThreatQ Platform and how ThreatQuotient began by Co-Founders Ryan Trost and Wayne Chiang.
Jul 15, 2019   |  By ThreatQuotient
Incident response is an organized approach to the process by which an organization handles the aftermath of a cyberattack or data breach with the goal of limiting damage and reducing recovery time and cost. Take a quick look at how to use ThreatQ for incident response.
Jul 13, 2021   |  By ThreatQuotient
Organizations are steadily investing in and improving their security operations, leading to an unprecedented demand for security-related roles and skills. According to the U.S. Bureau of Labor Statistics, it is expected that information security analyst jobs will increase 31% from 2019 to 2029. With this, analysts are expected to be masters of the craft, or "all-around defenders." In this report, you will learn: Learn the skills security analysts need to master to make them successful by downloading the report.
Jul 13, 2021   |  By ThreatQuotient
The past year has been filled with changes to almost every aspect of daily life, and cyber threat intelligence (CTI) work did not go untouched. CTI is analyzed information about the capabilities, opportunities, and intent of adversaries conducting cyber operations. Adversaries tend to operate in and across digital networks and equipment that shape and impact businesses, critical infrastructure, and people's daily lives. Even with the difficulties that 2020 brought, CTI work has continued to grow and mature.
Jun 1, 2021   |  By ThreatQuotient
In SANS' fifth yearly Threat Hunting Survey we examine how the cybersecurity industry is currently supporting threat hunting and how they are conducting threat hunting in their organizations.
Jun 1, 2021   |  By ThreatQuotient
The Adversarial Tactics, Techniques & Common Knowledge (ATT&CK) project by MITRE is an initiative started in 2015 with the goal of providing a "globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. Since its inception, ATT&CK has taken the information security industry by storm. Many vendors and information security teams the world over have moved to adopt it with blinding speed-and for good reason: It is one of the most exciting, useful and needed efforts within InfoSec in recent memory.
May 1, 2021   |  By ThreatQuotient
Cyber Threat Intelligence (CTI) is analyzed information about the capabilities, opportunities and intent of adversaries that meets a specific requirement determined by a stakeholder. Organizations with CTI programs focus on understanding the threats they face and providing specific information to help defend against those threats. Key survey takeaways: Copyright © 2019, ThreatQuotient, Inc. All Rights Reserved.

ThreatQuotient’s mission is to improve the efficiency and effectiveness of security operations with a platform that accelerates and simplifies investigations and collaboration within and across teams and tools.

To understand and stop threats more effectively and efficiently your existing security infrastructure and people need to work smarter, not harder. ThreatQ can serve as an open and extensible threat intelligence platform that accelerates security operations through streamlined threat operations and management. The integrated, self-tuning threat library, adaptive workbench and open exchange allow you to quickly understand threats, make better decisions and accelerate detection and response.

More than a Threat Intelligence Platform:

  • Prioritize: Automatically score and prioritize internal and external threat intelligence based on your parameters.
  • Integrate: Improve effectiveness of existing infrastructure by integrating your tools, teams and workflows.
  • Automate: Automate aggregation, operationalization and use of threat intelligence across all systems and teams.
  • Collaborate: Centralize threat intelligence sharing, analysis and investigation in a threat intelligence platform all teams can access.

Prioritize, automate & collaborate with a platform purpose-built for Threat-Centric Security Operations.