by Dave Krasik | Feb 21, 2023 | Blog
Dialing-up Data to Tackle Expanding Security Challenges Dave Krasik Many security professionals feel like broken records at this point when we say, “the threat landscape is constantly evolving”, and especially when we talk about how security operations centers (SOCs)...
by Julia Weifenbach | Feb 14, 2023 | Blog
There’s a New and Potentially More Dangerous Arrow in Cupid’s Quiver Julia Weifenbach It’s Valentine’s Day and love is in the air. Flowers, candy, cards and dinner are some of the classic ways we show our love on this day. But as an increasing number of people look...
by Guest Blog | Feb 7, 2023 | Blog
ISO 27001 welcomes Threat Intelligence Ramiro Céspedes Introduction In my previous article I defined what is Cyber Threat Intelligence (CTI), described how to measure it and explained why it is important to implement a CTI program that can serve different stakeholders...
by Celine Gajnik | Jan 31, 2023 | Blog
Automating SOC Operations: Tips for Embarking on an XDR Journey Celine Gajnik-Kinnoo Cybersecurity automation is a hot topic as organizations wrestle with the challenges of increasing attack volumes, cybersecurity skill shortages, and how to make the best use of...
by Guest Blog | Jan 24, 2023 | Blog
Effectively meeting and exceeding the requirements of the SAMA Cyber Threat Intelligence Principles Munaf Kazi Responsible for supervising nearly $1Trillion of assets across 30 banks and financial institutions, SAMA plays a crucial role in ensuring economic and...
by Dave Krasik | Jan 17, 2023 | Blog
Here’s What ThreatQuotient’s Crystal Ball Says for 2023 Dave Krasik From the team at ThreatQuotient, we hope you had a wonderful 2022 and are looking forward to an even better 2023. As we ring in a new year, we thought it would be fun to look into our crystal ball and...