by Guest Blog | Jun 8, 2022 | Blog
Reduce Time Or Do Not, There Is No Shift Dave Krasik In previous blog posts we’ve discussed the value of a data-driven approach to security operations. In this post, we’d like to reflect and take a closer look at what that approach means to the automation of SOC...
by Chris Jacob | May 31, 2022 | Blog, Cybersecurity, Threat Intelligence
Transform your Security Operations with ThreatQ - See how at RSAC 2022! CHRIS JACOB RSAConference 2022 USA hit the nail on the head with this year’s theme: Transform. The global pandemic has transformed every aspect of our lives – from online learning to remote work...
by Leon Ward | May 24, 2022 | Blog, Cybersecurity, Threat Intelligence
Taking a Data-Driven Approach to SOC Operations LEON WARD Today’s escalating threat landscape means that security operations teams face a multitude of challenges. This can make it challenging for them to keep pace with the sheer scale of threats, tactics and...
by Marc Solomon | May 10, 2022 | Blog, Cybersecurity, Threat Intelligence
Facing Staffing Challenges? The ThreatQ Platform Can Help MARC SOLOMON It may surprise you to learn that new research by CompTIA finds only 30% of the cyber workforce is in the 19-34 age group, with 52% between 35 and 54. You’d think more people entering the workforce...
by Guest Blog | May 3, 2022 | Blog, Cybersecurity, Threat Intelligence
Achieving Better Business Outcomes Through a CTI Practice AMY DONOVAN According to Joshua Ray, managing director, Global Cyber Defense Lead, Accenture, “Every business is digital now and must adopt a resilient cybersecurity posture to protect their value. Cyber...
by Guest Blog | Apr 26, 2022 | Blog, Cybersecurity, Threat Intelligence
XDR best of breed, and how an open architecture will get you there ED YOUNG The security landscape is continually changing and the race to stay ahead is often one of both victory and failure. As organizations globally continue to expand, security professionals are...