by Marc Solomon | Apr 26, 2018 | Blog, Cybersecurity, Threat Intelligence
Redefining a Threat Intelligence Platform to Address the Challenges of Security Operations POSTED BY MARC SOLOMON We’ve said this many times before: ThreatQuotient was founded with the belief that a threat intelligence platform must do more than just aggregate and...
by Leon Ward | Apr 12, 2018 | Blog, Cybersecurity, Threat Intelligence
Bringing order to security operations with ThreatQ Investigations POSTED BY LEON WARD I’m commonly heard saying that aspects of security operations and incident response are chaotic, but what do I mean by this? How can something that is so very technical, somewhat...
by Cyrille Badeau | Apr 3, 2018 | Blog, Cybersecurity
The Evolving Role of the CISO: Handling a Crisis When You Aren’t Under Attack POSTED BY CYRILLE BADEAU Traditionally, the mission of the CISO has been to convince the CEO of the capabilities the organization must put in place to prevent and follow-up on threats and...
by Liz Bush | Mar 20, 2018 | Blog, Cybersecurity
Join ThreatQ’s Gigi Schumm at Uniting Women in Cyber on March 29 POSTED BY LIZ BUSH According to a Forbes article published in January of this year, women comprise roughly 10% of the cybersecurity workforce. Historically, the number of women in technology companies...
by Nir Yosha | Mar 6, 2018 | Blog, Cybersecurity
Behind the Mystery Nation POSTED BY NIR YOSHA North Korea Hackers and the Bangladesh Bank Robbery Have you ever seen a satellite image shows North Korea compared to its neighbors when pieced together? North Korea is so secretive you can’t even see it from...
by ThreatQ | Feb 13, 2018 | Blog, Cybersecurity
Hitting the Trifecta – More Recognition from CRN POSTED BY THREATQUOTIENT Last year, ThreatQuotient received two awards from CRN. In July 2017, ThreatQuotient was named a CRN Emerging Vendor, and in November 2017, ThreatQuotient was a finalist in the CRN Tech...