by Ryan Trost | Jan 14, 2020 | Blog, Cybersecurity, Threat Intelligence
Cyber Predictions for 2020 POSTED BY RYAN TROST As the 2020 budget meetings come and go – teams are forced to assess their current defenses by analyzing their historical attacks in order to anticipate/predict future attack trends. A difficult but worthwhile...
by Liz Bush | Jan 7, 2020 | Blog, Cybersecurity, Threat Intelligence
Threat Hunting: Survey Results from the Trenches – Part 3 POSTED BY LIZ BUSH In Part 2 of this series we talked about common methodologies for threat hunting. Now, let’s look at how organizations are executing threat hunting – specifically the investments they’re...
by Liz Bush | Dec 17, 2019 | Blog, Cybersecurity, Threat Intelligence
Threat Hunting: Survey Results from the Trenches – Part 2 POSTED BY LIZ BUSH In Part 1 of this series, I shared the state of threat hunting as measured by SANS in their 2019 survey of threat hunters and security managers from various organizations around the globe....
by Liz Bush | Dec 10, 2019 | Blog, Cybersecurity, Threat Intelligence
Threat Hunting: Survey Results from the Trenches – Part 1 POSTED BY LIZ BUSH SANS recently published their 2019 Threat Hunting Survey in which they explore the differing needs of new and experienced threat hunters. In this three-part blog series, I provide an overview...
by John Czupak | Dec 3, 2019 | Blog, Corporate
Would You Like An Award To Go With That Award? POSTED BY JOHN CZUPAK I’m pleased to announce that ThreatQuotient was named a Northern Virginia Technology Council, 2019 NVTC Tech 100 company of the year. It’s humbling yet satisfying to be included among some of the...
by Liz Bush | Nov 19, 2019 | Blog, Cybersecurity
How Government Agencies Can Use Existing Resources to Increase Situational Awareness POSTED BY LIZ BUSH According to a survey conducted by IDC, the digital transformation of U.S. federal agencies is putting citizen data and national secrets at risk. While digital...