by Leon Ward | Sep 10, 2024 | Blog
Ransomware in the Global Healthcare Industry Leon Ward The World Health Organisation (WHO) recently hosted a webinar to discuss the critical importance of cybersecurity in the healthcare sector, which highlighted the severity of the situation the industry is currently...
by Noor Boulos | Aug 27, 2024 | Blog
Ace Your Back-to-School Season with Threat Intelligence Noor Boulos As the school year officially kicks off, students everywhere are hitting the books. But it’s also time for IT and security teams as well as administrators to get up to speed on the latest cyber...
by Julia Weifenbach | Aug 20, 2024 | Blog
Automating Intelligence with ThreatQ TDR Orchestrator Julia Weifenbach Human Workflow Optimization ThreatQ TDR Orchestrator serves as a bridge between human expertise and machine precision, optimizing workflows in security operations. By leveraging this dynamic...
by Guest Blog | Aug 13, 2024 | Blog
Enhancing Cybersecurity Collaboration: ThreatQ Data Exchange and Native TAXII Ed Young In today’s rapidly changing cybersecurity environment, organizations must share threat intelligence efficiently and effectively to stay ahead of potential threats. Recognizing...
by Celine Gajnik | Aug 6, 2024 | Blog
Mastering Best Practices for Vulnerability Management Celine Gajnik Understanding Vulnerability Management Understanding vulnerability management is crucial for maintaining the security of your systems. It involves identifying, assessing, and mitigating...
by Audrey Hoppenot | Jul 30, 2024 | Blog
The Power of Security Orchestration and Automation Audrey Hoppenot The Evolution of Cyber Threats In today’s digital landscape, cyber threats are constantly evolving and becoming more sophisticated. Attackers are finding new ways to breach security defenses and...