by Jonathan Couch | Mar 31, 2020 | Blog, Cybersecurity, Threat Intelligence
Threat Intelligence Decoded JONATHAN COUCH There are two types of cyber threats that organizations deal with which can be sorted into the following categories: hurricanes and earthquakes. Hurricanes, much like their namesake, are those attacks you can see coming and,...
by Liz Bush | Mar 30, 2020 | ThreatQ Profiles
Women in Cybersecurity PROFILE - NIDHI SHARMA Nidhi Sharma ThreatQuotient Product OwnerWhat do you do at ThreatQuotient? Technical product management for ecosystem and integrationHow long have you worked there? 2 yearsWhat do you enjoy most about your job? My team and...
by Liz Bush | Mar 26, 2020 | ThreatQ Profiles
Women in Cybersecurity PROFILE - AMY DONOVAN Amy DonovanThreatQuotientBusiness Development ManagerWhat do you do at ThreatQuotient? Help build our Partner Ecosystem. Constantly on the search for strategic partnerships that can incrementally help build our...
by Liz Bush | Mar 24, 2020 | Blog, Cybersecurity
New Research Uncovers Keys to Success for Women in Cybersecurity POSTED BY LIZ BUSH As part of our month-long celebration of women in cybersecurity, we’re pleased to make available to you a complimentary copy of the latest research by SANS, “Women in Cybersecurity:...
by Liz Bush | Mar 23, 2020 | ThreatQ Profiles
Women in Cybersecurity PROFILE - EMILY BLAIR Emily BlairThreatQuotientAutomation LeadWhat do you do at ThreatQuotient?I help ensure the quality of our platform by leading a team to write and maintain a set of automated tests that verify the product’s intended...