by Guest Blog | Feb 7, 2023 | Blog
ISO 27001 welcomes Threat Intelligence Ramiro Céspedes Introduction In my previous article I defined what is Cyber Threat Intelligence (CTI), described how to measure it and explained why it is important to implement a CTI program that can serve different stakeholders...
by Celine Gajnik | Jan 31, 2023 | Blog
Automating SOC Operations: Tips for Embarking on an XDR Journey Celine Gajnik-Kinnoo Cybersecurity automation is a hot topic as organizations wrestle with the challenges of increasing attack volumes, cybersecurity skill shortages, and how to make the best use of...
by Guest Blog | Jan 24, 2023 | Blog
Effectively meeting and exceeding the requirements of the SAMA Cyber Threat Intelligence Principles Munaf Kazi Responsible for supervising nearly $1Trillion of assets across 30 banks and financial institutions, SAMA plays a crucial role in ensuring economic and...
by Dave Krasik | Jan 17, 2023 | Blog
Here’s What ThreatQuotient’s Crystal Ball Says for 2023 Dave Krasik From the team at ThreatQuotient, we hope you had a wonderful 2022 and are looking forward to an even better 2023. As we ring in a new year, we thought it would be fun to look into our crystal ball and...
by Leon Ward | Jan 13, 2023 | Blog
In January the eyes of the global cyber security community will turn to London as the Cyberthreat conference gets under way. First launched in 2018, the event is a highlight in the cybersecurity calendar and a must-attend for cyber security intelligence...
by Guest Blog | Jan 10, 2023 | Blog
Defender to Defender: Voice of the Customer Webinar with Sysdig Michelle Mattear As more companies move their operations from on-prem to the cloud, they are turning to Sysdig which provides tools to secure containers, Kubernetes, and cloud services. The Sysdig Threat...