ThreatQuotient

Reston, VA, USA
2013
May 23, 2023   |  By ThreatQuotient
ThreatQ Platform and ThreatQ Investigations allow Thales to pioneer market-leading personalised threat intelligence services.
Intelligence is now considered essential to the process of identifying, understanding and acting upon threats. According to the "Global Perspectives on Threat Intelligence" study conducted by Mandiant, 96% of decision-makers interviewed for the research believe that it is important to understand which cyber threat actors could be targeting their organisation. Consequently, threat Intelligence should be fully integrated into the internal mechanisms linked to threat detection and response.
May 16, 2023   |  By Noor Boulos
We hear a lot about the cybersecurity skills gap, which the latest research puts at 770,000 open positions in the U.S. and 3.4 million globally. There are lots of reasons why organizations find themselves dealing with a skills deficit – from an actual dearth of qualified talent to internal factors including turnover, lack of budget/competitive wages, limited opportunities for growth and promotion, and lack of training.
May 9, 2023   |  By Guest Blog
Coping with limited resources is a common challenge for security operations teams. Whether it’s due to budget constraints, staffing shortages, or other factors, security teams often need to find ways to do more with less. Let’s talk about some strategies we can use to achieve success in this environment.
May 2, 2023   |  By Julia Weifenbach
We’ve come a long way since ThreatQ v4 and our own Jay Allmond, UK Threat Intelligence Engineer at ThreatQuotient, recently shared the details during a hands-on webinar that’s now available on-demand. In this 30-minute session that as Jay says, “is light on PowerPoint and heavy on nerdy stuff”, we review the basics of the ThreatQ Platform and dive deep into some of the newest capabilities.
Apr 20, 2023   |  By Julia Weifenbach
Dave Krasik, Director of Product Management at ThreatQuotient, recently had a chance to speak with Ed Amoroso, CEO and founder of TAG Cyber, a leading cybersecurity advisory group, about the state of cybersecurity automation. They covered a lot of ground, and you can listen to the full interview here. Following are a few of the highlights.
Apr 18, 2023   |  By ThreatQuotient
Self-paced training modules accelerate user proficiency of the ThreatQ Platform for any operational need, ensuring immediate return on investment for ThreatQuotient clients and partners.
Apr 11, 2023   |  By Guest Blog
These days it is not uncommon to see large companies trying to make do with less, which often means trying to maintain the same amount of output with less manpower. Working efficiently to improve a product while battling engineer burnout in parallel has never been more crucial.
Apr 4, 2023   |  By Leon Ward
RSAConference 2023 USA hit the nail on the head with this year’s theme: Stronger Together. From the U.S. federal government’s prioritization to promote threat intelligence sharing, to the geopolitical environment and joining of allies to combat cyberwarfare, and the cybersecurity industry’s buzz around frameworks and architectures that prioritize detection and response across the enterprise.
Feb 28, 2023   |  By Guest Blog
In all relationships, issues can arise. The key to solving those issues is to have a clear understanding of the issue itself. For instance, when a customer reports an issue it is critical to listen to the customer with patience and empathy so that they feel understood, and to assure them that they will receive assistance promptly. Furthermore, product issues can present themselves in various forms of complexities.
Feb 23, 2023   |  By ThreatQuotient
ThreatQuotient's Director of Alliances, Haig Colter, assumes the role of host in our series Hangin’ with Haig: Conversations Beyond the Keyboard. In our upcoming episode, we welcome Valéry Marchive. Co-founder of LeMagIT, Valéry has been its editor-in-chief since January 2020. A computer scientist by training, he specialised in cybersecurity and has developed an investigative approach to his journalistic practice, both in studying known cyberattacks and in understanding the dynamics of cybercrime. For several years, he has meticulously investigated cyber attacks with ransomware and their perpetrators.
Feb 1, 2023   |  By ThreatQuotient
Learn how the ThreatQ Platform solves the challenges of security operations.
Dec 17, 2021   |  By ThreatQuotient
ThreatQuotient's Director of Alliances, Haig Colter, assumes the role of host in our series Hangin’ with Haig: Conversations Beyond the Keyboard. In our upcoming episode, we welcome Jessica O’Bryan, Cyber Threat Intelligence & Threat Hunt Development Lead for the Cyber Security Operations Center (CSOC) at Viasat. Haig will dive into Jessica’s journey in the cybersecurity industry and her love for rock climbing and surfing. In order to follow her passion for the outdoors and sports, Jessica has traveled throughout the west coast in a camper. Join us and listen in on Jessica's incredible adventures.
Aug 11, 2021   |  By ThreatQuotient
Learn how ThreatQ solves the challenges of security operations.
Jul 8, 2021   |  By ThreatQuotient
Behind marketing buzzwords, product pitches, and business cycles, the complex cybersecurity market often forgets about the force that makes our world turn: the people that are embedded within it. That’s why we’ve created a livestream series that isn’t a pitch or demo, but a highlight of a star player– whether it be a non-profit partner or SOC leader, who has a tale to tell.
Apr 27, 2021   |  By ThreatQuotient
Joel Bork, Jonathan Couch, and Christian Galladora dive into the ThreatQuotient Threat Intelligence and Investigative Platform to uncover the technical details and features that exist!
Mar 24, 2021   |  By ThreatQuotient
Behind marketing buzzwords, product pitches, and business cycles, the complex cybersecurity market often forgets about the force that makes our world turn: the people that are embedded within it. That’s why we’ve created a livestream series that isn’t a pitch or demo, but a highlight of a star player– whether it be a non-profit partner or SOC leader, who has a tale to tell.
Feb 18, 2021   |  By ThreatQuotient
See how ThreatQ's normalized data accelerates multiple partner integrations and improves searchable threats automatically with Cisco SecureX.
Jul 13, 2021   |  By ThreatQuotient
Organizations are steadily investing in and improving their security operations, leading to an unprecedented demand for security-related roles and skills. According to the U.S. Bureau of Labor Statistics, it is expected that information security analyst jobs will increase 31% from 2019 to 2029. With this, analysts are expected to be masters of the craft, or "all-around defenders." In this report, you will learn: Learn the skills security analysts need to master to make them successful by downloading the report.
Jul 13, 2021   |  By ThreatQuotient
The past year has been filled with changes to almost every aspect of daily life, and cyber threat intelligence (CTI) work did not go untouched. CTI is analyzed information about the capabilities, opportunities, and intent of adversaries conducting cyber operations. Adversaries tend to operate in and across digital networks and equipment that shape and impact businesses, critical infrastructure, and people's daily lives. Even with the difficulties that 2020 brought, CTI work has continued to grow and mature.
Jun 1, 2021   |  By ThreatQuotient
In SANS' fifth yearly Threat Hunting Survey we examine how the cybersecurity industry is currently supporting threat hunting and how they are conducting threat hunting in their organizations.
Jun 1, 2021   |  By ThreatQuotient
The Adversarial Tactics, Techniques & Common Knowledge (ATT&CK) project by MITRE is an initiative started in 2015 with the goal of providing a "globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. Since its inception, ATT&CK has taken the information security industry by storm. Many vendors and information security teams the world over have moved to adopt it with blinding speed-and for good reason: It is one of the most exciting, useful and needed efforts within InfoSec in recent memory.
May 1, 2021   |  By ThreatQuotient
Cyber Threat Intelligence (CTI) is analyzed information about the capabilities, opportunities and intent of adversaries that meets a specific requirement determined by a stakeholder. Organizations with CTI programs focus on understanding the threats they face and providing specific information to help defend against those threats. Key survey takeaways: Copyright © 2019, ThreatQuotient, Inc. All Rights Reserved.

ThreatQuotient’s mission is to improve the efficiency and effectiveness of security operations with a platform that accelerates and simplifies investigations and collaboration within and across teams and tools.

To understand and stop threats more effectively and efficiently your existing security infrastructure and people need to work smarter, not harder. ThreatQ can serve as an open and extensible threat intelligence platform that accelerates security operations through streamlined threat operations and management. The integrated, self-tuning threat library, adaptive workbench and open exchange allow you to quickly understand threats, make better decisions and accelerate detection and response.

More than a Threat Intelligence Platform:

  • Prioritize: Automatically score and prioritize internal and external threat intelligence based on your parameters.
  • Integrate: Improve effectiveness of existing infrastructure by integrating your tools, teams and workflows.
  • Automate: Automate aggregation, operationalization and use of threat intelligence across all systems and teams.
  • Collaborate: Centralize threat intelligence sharing, analysis and investigation in a threat intelligence platform all teams can access.

Prioritize, automate & collaborate with a platform purpose-built for Threat-Centric Security Operations.