Story image

ThreatQuotient partners with Visa for payments safety

06 Nov 2018

ThreatQuotient has announced that it is integrating verified breach intelligence from Visa to enable customers to better detect and protect against cyber attacks targeting payment data.

The integration of the ThreatQ threat intelligence platform with Visa Threat Intelligence will provide incident responders and defenders of corporate networks with the context, customisation and collaboration needed to transform critical threat data into actionable threat intelligence that can help identify breaches in advance.

Visa Threat Intelligence is a subscription service delivered via the Visa Developer Center API that shares Indicators of Compromise (IOCs) – data derived from Visa investigations into past and ongoing payment system breaches.

Together with ThreatQ’s Threat Library, Adaptive Workbench and Open Exchange, organisations can benefit from increased security effectiveness and more efficient threat operations and management.

This integration can be instrumental in helping customers determine if they have been the victim of a financially motivated breach, and fortifying their cyber defences to prevent future breaches in a broader effort to prevent card fraud.

“Retailers are investing heavily in cybersecurity to protect payment card data and other personally identifiable information, and ThreatQuotient is proud to partner with Visa to bring a stronger security resource to this market,” says ThreatQuotient APAC regional director Anthony Stitt.

“Cyber criminals are reusing tactics, techniques and procedures, leaving a recognisable trail of breadcrumbs and insights into the very attacks they are launching.

“This partnership is going to provide defenders with the tools needed to put these insights into action, offering a leg-up against adversaries and helping to automate processes and make existing resources, both people and infrastructure, even more effective.”

Leaders in retail understand that facing a breach would be a high-profile event and that they must take a more proactive approach to prevent successful attacks.

Threat actors reuse the same tactics – specific malware, targeted vulnerabilities and preferred infrastructure – to execute attacks across a wide range of merchants.

By focusing on the characteristics of previous attacks using verified breach data, security analysts can detect and mitigate risks sooner.

About ThreatQuotient’s open and extensible threat intelligence platform, ThreatQ, and cybersecurity situation room solution, ThreatQ Investigations, aims to empower security teams with the context, customisation and prioritisation needed to make better decisions, accelerate detection and response, and advance team collaboration.

Cloud application attacks in Q1 up by 65% - Proofpoint
Proofpoint found that the education sector was the most targeted of both brute-force and sophisticated phishing attempts.
Singapore firm to launch borderless open data sharing platform
Singapore-based Ocean Protocol, a decentralised data exchange that promotes data sharing, has revealed details of what could be the kickstart to a global and borderless data economy.
Huawei picks up accolades for software-defined camera ecosystem
"The company's software defined capabilities enable it to future-proof its camera ecosystem and greatly lower the total cost of ownership (TCO), as its single camera system is applicable to a variety of application use cases."
Tech community rocked by deaths of Atta Elayyan and Syed Jahandad Ali
Both men were among the 50 killed in the shooting in Christchurch last Friday when a gunman opened fire at two mosques.
NZ ISPs block internet footage of Christchurch shootings
2degrees, Spark, Vodafone and Vocus are now blocking any website that shows footage of the mosque shootings.
Barracuda expands MSP security offerings with RMM acquisition
Managed Workplace delivers an RMM platform with security tools and services, such as site security assessments, Office 365 account management, and integrated third-party antivirus.
Flashpoint: APAC companies must factor geopolitics in cyber strategies
The diverse geopolitical and economic interests of the states in the region play a significant role in driving and shaping cyber threat activity against entities operating in APAC.
Expert offers password tips to aid a stress-free sleep
For many cybersecurity professionals, the worries of the day often crawl into night-time routines - LogMeIn says better password practices can help.