Latest News
PRESS RELEASES, MEDIA COVERAGE AND LATEST UPDATES FROM THREATQUOTIENTWhy we need to get a handle on AI
There has been a lot of talk about AI recently debating its opportunities and potential risks. Today AI can be trained on images and videos of real customers or executives, to produce audio and video clips impersonating them. These have the potential to fool security systems, and according to a report by identity verification platform Sumsub, the number of “deepfake” incidents in the financial technology sector alone increased by 700% in 2023, year on year.
This issue suddenly hit much closer to home for me when Pikesville High School, my alma mater, recently made the headlines for all the wrong reasons. It seems that the school’s athletic director allegedly used AI to create and publish a fake recording of the principal’s voice making, let’s just say, inappropriate comments. This prompted immediate public outrage against the principal before these allegations came forward. However, the principal’s reputation is stained regardless of the outcome. This situation serves as a salutary warning that as a society we need to get a handle on AI before such instances become a daily occurrence.
Building the right vendor ecosystem – a guide to making the most of RSA
With automated, detailed, contextualized threat intelligence, organizations can better anticipate malicious activity and utilize intelligence to speed detection around proven attacks.
Why Intelligence Sharing Is Vital to Building a Robust Collective Cyber Defense Program
With automated, detailed, contextualized threat intelligence, organizations can better anticipate malicious activity and utilize intelligence to speed detection around proven attacks.
Risk and Regulation: Preparing for the Era of Cybersecurity Compliance
As cybersecurity professionals, we talk a lot about risk. In a world where only the most naïve would suggest that we can prevent all cyber-attacks, we must make sure we understand which cyber threats have the highest risk of becoming reality, and allocate our security resources accordingly. Indeed, this is a key use case for threat intelligence platforms, which help companies identify and understand threats in the context of their business. In our hyper-connected technology environment, if everyone does this effectively, cybersecurity standards will rise, and collective risk will be reduced.
ThreatQuotient Partners with the Electricity Information Sharing and Analysis Center as a Member of its Vendor Affiliate Program
ThreatQuotient Partners with the Electricity Information Sharing and Analysis Center as a Member of its Vendor Affiliate Program. ThreatQuotient will contribute subject matter expertise to E-ISAC to support the defense of North America’s electricity grid against cyber attacks.
From Open Source to Enterprise Ready: 4 Pillars to Meet Your Security Requirements
For organizations building a security operations practice, open-source tools are a great place to start. The software is often free to use so it’s a low-risk way for teams to dig into practice areas and…
Blog I Financial services companies seek to unlock efficiencies of cybersecurity automation
As cyber threats intensify and the resources to deal with them remain limited, there is a growing need for automation in cybersecurity. The…
Blog I Bridging the cybersecurity skills gap
One aspect that is within a company’s control, but is often unremarked, is unrealistic hiring practices. While this can be a problem across all sectors – after all, every business wants to be sure they…
Why are cybersecurity automation projects failing?
The cybersecurity landscape is undergoing significant transformations exemplified by increasing complexity, constantly evolving threats and, as a result, the necessity for ever-more sophisticated and integrated…
Enzoic and ThreatQuotient Partner to Protect Companies from Compromised Credentials
Integration of Enzoic’s Dark Web Monitoring with the ThreatQ Threat Intelligence Platform enables companies to respond to potential compromise.