Latest News
PRESS RELEASES, MEDIA COVERAGE AND LATEST UPDATES FROM THREATQUOTIENTRisk and Regulation: Preparing for the Era of Cybersecurity Compliance
As cybersecurity professionals, we talk a lot about risk. In a world where only the most naïve would suggest that we can prevent all cyber-attacks, we must make sure we understand which cyber threats have the highest risk of becoming reality, and allocate our security resources accordingly. Indeed, this is a key use case for threat intelligence platforms, which help companies identify and understand threats in the context of their business. In our hyper-connected technology environment, if everyone does this effectively, cybersecurity standards will rise, and collective risk will be reduced.
ThreatQuotient Partners with the Electricity Information Sharing and Analysis Center as a Member of its Vendor Affiliate Program
ThreatQuotient Partners with the Electricity Information Sharing and Analysis Center as a Member of its Vendor Affiliate Program. ThreatQuotient will contribute subject matter expertise to E-ISAC to support the defense of North America’s electricity grid against cyber attacks.
From Open Source to Enterprise Ready: 4 Pillars to Meet Your Security Requirements
For organizations building a security operations practice, open-source tools are a great place to start. The software is often free to use so it’s a low-risk way for teams to dig into practice areas and…
Blog I Financial services companies seek to unlock efficiencies of cybersecurity automation
As cyber threats intensify and the resources to deal with them remain limited, there is a growing need for automation in cybersecurity. The…
Blog I Bridging the cybersecurity skills gap
One aspect that is within a company’s control, but is often unremarked, is unrealistic hiring practices. While this can be a problem across all sectors – after all, every business wants to be sure they…
Why are cybersecurity automation projects failing?
The cybersecurity landscape is undergoing significant transformations exemplified by increasing complexity, constantly evolving threats and, as a result, the necessity for ever-more sophisticated and integrated…
Enzoic and ThreatQuotient Partner to Protect Companies from Compromised Credentials
Integration of Enzoic’s Dark Web Monitoring with the ThreatQ Threat Intelligence Platform enables companies to respond to potential compromise.
How can companies leverage machine learning to mitigate cyber threats?
Cybersecurity has become one most crucial aspects of many organizations due to the speed at which cyber threats evolve. The “speed of cybersecurity” makes it vital to have timely and agile defense measures…
How to Get Started With Security Automation: Consider the Top Use Cases Within Your Industry
As the cybersecurity industry has matured, so has the approach security teams take to making decisions about investing in security tools. Instead of focusing on the latest product or technology, security professionals are focused on…
Burn and Churn: CISOs and the Role of Cybersecurity Automation
Organizations need to listen to their CISOs and start turning to cybersecurity automation for the qualitative benefits of employee satisfaction and well-being.