The ultimate threat hunting technology.
Hunting and Gathering: Before you can hunt for threats you need to gather the right data at the right time.
Search and destroy.
Learning on the job.
A security debriefing in metrics.
Enterprise Security teams are looking for proven ways to increase the visibility of their security programs while also optimizing technology investments. A large number of organizations have implemented Endpoint Detection and Response (EDR) solutions and many others are considering it. While these solutions are best known as being effective incident response tools, they also help […]
On December 13th, a disclosure was made for a compromise in the SolarWinds IT Management software suite code base that made a supply chain attack possible for all SolarWinds customers. While it is unknown how many of the SolarWinds customers are facing impacts from the supply chain attack, it is widely acknowledged that this foothold is […]
On March 2, 2021, Microsoft Security Response Center released updates related to vulnerabilities affecting on-premises deployments of Microsoft Exchange Server 2013/2016/2019. Microsoft also revealed details around active exploitation of these vulnerabilities using zero-day exploits. This RQ Threat Advisory outlines the vulnerability and its exploitation in more detail including IoCs (indicators of compromise) and GreyMatter detection […]
Many security teams are overwhelmed and overworked, and consequently stuck in reactive mode. One way teams look to proactively identify threats and mitigate vulnerabilities is through threat hunting – but how do you know where to begin and what to look for? Getting started can be the hardest part. That’s why we’ve put together a […]
Barely a few decades old, the Information Security profession struggles with standardization. This can be seen across the board from naming and defining capabilities, vulnerabilities, and adversaries to even the most basic terms that are used every day. Oftentimes, this results in the misunderstanding of essential information during an investigation and a limited ability to […]