by Leon Ward | Aug 30, 2022 | Blog
Unlock the Power of Security Automation: 3 Use Cases to Consider Leon Ward At ThreatQuotient, we write a lot about security automation. Most recently, we’ve discussed how our data-driven approach to automation helps enable extended detection and response (XDR) in all...
by Cyrille Badeau | Aug 23, 2022 | Blog
As the Cyber Threat Environment Escalates, How are Organizations Responding? Cyrille Badeau Globally, the cyber threat level to organizations remains high and the current situation only serves to highlight this further. To this point, any organization that has...
by Noor Boulos | Aug 16, 2022 | Blog
Breaking Barriers at Black Hat 2022 with Women in Cybersecurity Kasey Ello After more than two years of having our days filled with Zoom meetings, many of us in the cybersecurity industry have been eager to get back to in-person events and conferences to reconnect...
by Yann LeBorgne | Aug 9, 2022 | Blog
Automation in Cybersecurity: Overcoming Barriers to Adoption Yann Le Borgne “Automation” has become a buzzword in cybersecurity circles. That’s not surprising in an environment where security specialists are in short supply and under intense pressure to defend the...
by Guest Blog | Aug 2, 2022 | Blog
Correlating Data across Multiple Security Systems and Tools with XDR Syed Kaptan Gartner defines XDR as solutions that “automatically collect and correlate data from multiple security products to improve threat detection and provide an incident response capability.”...
by Noor Boulos | Jul 26, 2022 | Blog
Looking for Some Summer Reading? Check Out Our Top Blogs so Far this Year Kasey Ello Summertime often means vacation time and a chance to rest, relax and catch up on some reading. But for those of us in cybersecurity it can be hard to truly disconnect. The threat...