The ThreatQuotient Blog
EXPERTS SHARING THEIR CYBER THREAT INTELLIGENCE INSIGHTS AND EXPERIENCESRun out of Netflix options? Check out our Most Popular Webinars for 2021
In 2021, we covered a lot of important topics and wanted to make sure you didn’t miss our top five webinars for the year.
A Guide to ThreatQuotient’s Top Blogs for 2021
To make sure you don’t miss any “must-read” topics, we’ve compiled our top five blogs for 2021 and provided a brief summary of each so you can scan for areas of interest to you.
The Threat Model as a Compass
The purpose of the Cyber Threat Intelligence (CTI) team is to understand the cyber threat environment and communicate intelligence so that the organisation can make better decisions about lowering cyber risk.
What Does Sun Tzu Have to Do with XDR? More Than You Might Think!
Military general and philosopher Sun Tzu once led the largest armies in the world and authored The Art of War, still considered a masterpiece of tactical warfare and very relevant as we wage our battles against evolving cyberattacks.
Integration of the ThreatQ platform into McAfee Enterprise infrastructure
Proper management of threat data is critical in today’s security operations and modern SOCs. The knowledge of threats, their priority in our environment, their management…
Preparing for the SOC of the Future, Today? We’ve Got You Covered
Last week, we announced v5 of the ThreatQ platform with capabilities needed today to support the security operations center (SOC) of the future.
Elevating What a TIP Can Be – The ThreatQ Platform
In a previous blog I reviewed the foundational use case for a TIP, which is threat intelligence management—the practice of aggregating, analyzing, enriching and de-duplicating internal and external threat data…
Cybersecurity Breakthrough Awards Names ThreatQuotient Security Automation Solution of the Year
We are proud to share with you that the Cybersecurity Breakthrough Awards has recognized ThreatQuotient as the Security Automation Solution of the Year.
5 Best Practices to Get More from Threat Intelligence
As we wrap up Cybersecurity Awareness Month 2021, this week’s theme, Cybersecurity First, is all about making security a priority.
Interested in a Career in Cybersecurity? These Tips Can Help Guide Your Journey
In support of this week’s Cybersecurity Awareness Month theme, “Cybersecurity Career Awareness,” I had an opportunity to speak with Dave Stromberg…
Curate and Share Threat Intelligence to Accelerate Security Operations
Over the last several months we’ve seen a tremendous uptick in cyberattacks. Nearly every day, news of another ransomware, supply chain or zero-day attack makes headline news.
2020 Was the Year of the Phish. Let’s Make Sure 2021 Isn’t a Sequel
2020 was the year of the phish. Well, not officially. According to the Chinese Zodiac, 2020 was the Year of the Rat. But if you look at it from a cyberattack trends perspective, plenty of third parties…
Cybersecurity Awareness Month Isn’t Just for Techies: Tips for Everyone
This month marks the 18th year of Cybersecurity Awareness Month (CSAM) which focuses on helping provide individuals with resources they need to stay safer…
Security Automation Priorities and Challenges: How Do You Compare to Your Peers?
ThreatQuotient’s new survey on the State of Cybersecurity Automation Adoption is now available for download.
Learn How to Detect and Manage External Exposure Risks
The escalation of cyberattacks since early 2020 is requiring many companies to strengthen their security operations. Adversaries are taking advantage of new attack vectors – like IoT devices, insecure…
Help us Celebrate World Rhino Day
For our third year in a row, ThreatQuotient is excited to celebrate World Rhino Day and the remarkable work Helping Rhinos does to help rhinos survive at sustainable levels in their natural habitat.
SANS Report Reveals Significant Growth in Automation: Maximize Your Investments
Let’s face it, we’ve talked about security automation for years. We’ve grappled with what, when and how to automate. We’ve debated the human vs machine topic.
Leveraging MISP and TheHive When You Create Your CTI Practice
For organizations with limited resources or just beginning to build a SecOps practice, MISP and TheHive are easy-to-use tools to help your teams react to malicious threats.