by Guest Blog | Jul 11, 2023 | Blog
4 Steps to a Comprehensive Security Approach Rich Walchuck Software supply chain attacks have become a major concern for organizations in recent years, as cybercriminals increasingly target third-party software components and libraries used to build applications....
by Audrey Hoppenot | Jul 4, 2023 | Blog
What the Financial Sector Needs Now: Risk-Based Vulnerability Management Audrey Hoppenot According to the Verizon 2023 Data Breach Investigations Report, basic web application attacks, which consist largely of leveraging vulnerabilities and stolen credentials to get...
by Thomas Ashoff | Jun 27, 2023 | Blog
The Speed of Security & AI Tom Ashoff ThreatQuotient’s Perspective on Security Operations and vision for AI in the ThreatQ Platform We’re all familiar with the “speed of cybersecurity”, the rapid pace at which cyber threats evolve and the corresponding...
by Julia Weifenbach | Jun 20, 2023 | Blog
Are You Getting the ROI You Need from Your Security Investments? Julia Weifenbach The persistent shortage of skilled cybersecurity professionals which grew by 26.2% over the past year, coupled with the fact that global cyberattacks increased 38% in 2022, means...
by Guest Blog | Jun 13, 2023 | Blog
5 Tips For Selecting Your Source of Threat Intelligence Information Nigel Houghton In today’s digital world, cybersecurity threats are on the rise, and businesses must stay vigilant to protect their sensitive data from cybercriminals. To combat these threats,...
by Leon Ward | Jun 6, 2023 | Blog
Risk-based Vulnerability Management: A Bigger Bang for Your Buck Leon Ward Every five to ten years, major technology shifts change the way that vulnerability assessment and the related IT risk mitigation processes are approached or implemented. What has remained...