Latest News
PRESS RELEASES, MEDIA COVERAGE AND LATEST UPDATES FROM THREATQUOTIENTPulling Back the Curtain on Bug Bounties
There has been a lot of coverage in the media recently concerning the Pegasus spyware and the zero-click exploits that are starting to emerge.
How Integration is Evolving: The X Factor in XDR
Over the past couple of months, I’ve talked about how adversaries are evolving their approaches to attacks and the ripple effect that is having on our approach to detection and response.
ThreatQuotient Publishes Research Report: State of Cyber Security Automation Adoption in 2021
Based on survey results from 250 senior cybersecurity professionals at UK companies employing 2,000+ people from a range of industries, the report determined 98% intend to automate more in the next 12 months, but 41% have a lack of trust in automation’s outcomes.
ThreatQuotient Continues Tradition of Celebrating World Rhino Day in 2021
ThreatQuotient™, a leading security operations platform innovator, today invites the cybersecurity industry to celebrate World Rhino Day 2021.
How Threat Response is Evolving
Here, I’d like to talk about how our approach to response has been impacted and must evolve and expand as well. It is no longer about our antivirus tool detecting a malicious file and quarantining.
How Threat Detection is Evolving
The threat landscape is dynamic and ever changing. Adversaries are evolving their approaches and targets
10 Questions to Navigate the Security Industry’s Marketing Madness
We’ve all been there. You’re walking the exhibit floor of a security industry conference and nearly every vendor is peddling the same “next big thing.”
ThreatQuotient Wins Frost & Sullivan’s Best Practices Competitive Strategy Leadership Award for XDR
Frost & Sullivan strictly reserves this recognition for companies at the forefront of innovation and growth in their respective industries, and believes that ThreatQuotient will emerge as a transparent and reliable vendor that supports security operations aligned with XDR’s vision.
Security is a Big Data Problem, and It’s Getting Bigger
As business models change, adversaries take advantage of new attack vectors – like IoT devices, operational technology (OT) and the multiple personal and work devices users now move between.
Never Assume: Key Learning from the Colonial Pipeline Attack
There is a lot of attention on Operational Technology (OT) networks and critical infrastructure companies as of late. The Russians have targeted the Ukrainian energy sector since 2015, and now Russian-based actors are believed to be behind the Colonial Pipeline attack.