by Leon Ward | Apr 23, 2024 | Blog
Breaking the cybersecurity automation logjam won’t break the bank Leon Ward Right now, to boost efficiency and achieve economies of scale, businesses want to automate as much as possible. In back office processes, approaches like Robotic Process Automation (RPA), for...
by Celine Gajnik | Apr 16, 2024 | Blog
Enhancing Cyber Resilience: Safeguarding the Electricity Grid Celine Gajnik Digital transformation powers critical infrastructure, the protection of systems is paramount. ThreatQuotient has announced its participation in the vendor affiliate program of the Electricity...
by Guest Blog | Apr 9, 2024 | Blog
Leveraging Threat Intelligence for Regulatory Compliance Cyrille Badeau The US Government recently announced that state-sponsored Chinese cyber group Volt Typhoon has compromised multiple critical infrastructure organisations’ IT networks in the US and is preparing...
by Leon Ward | Apr 2, 2024 | Blog
The CISO's Next Priority Isn't Technology - It's Building a Great Employee Experience Leon Ward In security, we are very used to talking about features and functions in the tools we use. When it comes to measuring the positive impact of what we spend on cyber, in...
by Julia Weifenbach | Mar 29, 2024 | Blog, ThreatQ Profiles
Women in Cybersecurity PROFILE - LYDIA GRILHERES Lydia Grilheres Responsable Marketing Operationnel – Thales How long have you worked there?I have been working for Thales for eight years, within several activities, including four years in the cybersecurity...
by Julia Weifenbach | Mar 27, 2024 | Blog, ThreatQ Profiles
Women in Cybersecurity PROFILE - JEN VANANTWERP Jen VanAntwerp Founder – Sober in Cyber Owner – JVAN Consulting How long have you worked there?We began building the Sober in Cyber community in early 2023, and publicly launched the nonprofit in August of...