Unlock the Power of Automation: Vulnerability Management

Unlock the Power of Automation: Vulnerability Management

Unlock the Power of Automation: Vulnerability Management Dave Krasik We’ve spoken extensively about the importance of taking a data-driven approach to Vulnerability Management.  In short the efficiency and effectiveness of vulnerability management processes depend...
Spear Phishing Triage Using ThreatQ and TDR Orchestrator

Spear Phishing Triage Using ThreatQ and TDR Orchestrator

Spear Phishing Triage Using ThreatQ and TDR Orchestrator Ed Young According to Proofpoint’s 2021 State of the Phish Report, more than 80% of organizations fell victim to a phishing attack last year.  Another report from PhishMe  found that 91% of cyberattacks start...