by Dave Krasik | Sep 27, 2022 | Blog
Unlock the Power of Automation: Vulnerability Management Dave Krasik We’ve spoken extensively about the importance of taking a data-driven approach to Vulnerability Management. In short the efficiency and effectiveness of vulnerability management processes depend...
by Guest Blog | Sep 21, 2022 | Blog
Spear Phishing Triage Using ThreatQ and TDR Orchestrator Ed Young According to Proofpoint’s 2021 State of the Phish Report, more than 80% of organizations fell victim to a phishing attack last year. Another report from PhishMe found that 91% of cyberattacks start...
by Marc Solomon | Sep 8, 2022 | Blog
Organizations are traveling the road to cybersecurity automation, but it is not a smooth journey Marc Solomon Our latest industry research – ‘The 2022 State of Cybersecurity Automation Adoption’ – which we have undertaken for the second year running and...
by Chris Jacob | Sep 6, 2022 | Blog
Unlock the Power of Security Automation: Threat Intelligence Management Chris Jacob Threat intelligence has become a significant input to the overall ecosystem that organizations leverage in their security footprint. Managing that data and the contextualization...
by Leon Ward | Aug 30, 2022 | Blog
Unlock the Power of Security Automation: 3 Use Cases to Consider Leon Ward At ThreatQuotient, we write a lot about security automation. Most recently, we’ve discussed how our data-driven approach to automation helps enable extended detection and response (XDR) in all...
by Cyrille Badeau | Aug 23, 2022 | Blog
As the Cyber Threat Environment Escalates, How are Organizations Responding? Cyrille Badeau Globally, the cyber threat level to organizations remains high and the current situation only serves to highlight this further. To this point, any organization that has...