by Marc Solomon | Jul 19, 2022 | Blog
Security Automation, Lessons Learned from Top Gun: Maverick Marc Solomon The cybersecurity industry has talked about security automation for years. We’ve grappled with what, when and how to automate. We’ve debated the human vs machine topic. And when we’ve been burned...
by Guest Blog | Jul 12, 2022 | Blog
Ethics, Design and Cybersecurity Bella Jones Connections Behind Dark UX Patterns and Social Engineering Tactics If you work in an organization, you’ve probably had to take a cybersecurity training course at some point during your time there. Regardless of whether you...
by Guest Blog | Jul 5, 2022 | Blog
The Meaning of Orchestration Vicki Lemay Recently, ThreatQuotient hosted an interactive discussion regarding security orchestration and cyber security automation adoption – what it is, what it’s meant to do, and why it can present a challenge for security teams...
by Cyrille Badeau | Jun 28, 2022 | Blog
The Current State of Intelligent Automation Adoption in Cybersecurity Cyrille Badeau In the past year, research indicates that nearly a third of organizations have accelerated their plans to automate key security and IR processes, while another 85% plan on automating...
by Chris Jacob | Jun 21, 2022 | Blog
The ThreatQuotient Crash at RSAC and FIC Chris Jacob It had been a long time since many of the ThreatQuotient Crash had attended a security industry conference in person, and wouldn’t you know we had two at the same time—RSAC 2022 in San Francisco, CA and FIC 2022 in...
by Julia Weifenbach | Jun 14, 2022 | Blog
Security Tips as Summer Travel Heats Up Julia Weifenbach “Safe travels!” It’s been a long time since most of us have uttered that phrase. Now we’re saying it with increasing regularity as family members, friends and colleagues are traveling again with greater ease and...