The ThreatQuotient Blog
EXPERTS SHARING THEIR CYBER THREAT INTELLIGENCE INSIGHTS AND EXPERIENCESWhat Does Sun Tzu Have to Do with XDR? More Than You Might Think!
Military general and philosopher Sun Tzu once led the largest armies in the world and authored The Art of War, still considered a masterpiece of tactical warfare and very relevant as we wage our battles against evolving cyberattacks.
Integration of the ThreatQ platform into McAfee Enterprise infrastructure
Proper management of threat data is critical in today’s security operations and modern SOCs. The knowledge of threats, their priority in our environment, their management…
Preparing for the SOC of the Future, Today? We’ve Got You Covered
Last week, we announced v5 of the ThreatQ platform with capabilities needed today to support the security operations center (SOC) of the future.
Elevating What a TIP Can Be – The ThreatQ Platform
In a previous blog I reviewed the foundational use case for a TIP, which is threat intelligence management—the practice of aggregating, analyzing, enriching and de-duplicating internal and external threat data…
Cybersecurity Breakthrough Awards Names ThreatQuotient Security Automation Solution of the Year
We are proud to share with you that the Cybersecurity Breakthrough Awards has recognized ThreatQuotient as the Security Automation Solution of the Year.
5 Best Practices to Get More from Threat Intelligence
As we wrap up Cybersecurity Awareness Month 2021, this week’s theme, Cybersecurity First, is all about making security a priority.
Interested in a Career in Cybersecurity? These Tips Can Help Guide Your Journey
In support of this week’s Cybersecurity Awareness Month theme, “Cybersecurity Career Awareness,” I had an opportunity to speak with Dave Stromberg…
Curate and Share Threat Intelligence to Accelerate Security Operations
Over the last several months we’ve seen a tremendous uptick in cyberattacks. Nearly every day, news of another ransomware, supply chain or zero-day attack makes headline news.
2020 Was the Year of the Phish. Let’s Make Sure 2021 Isn’t a Sequel
2020 was the year of the phish. Well, not officially. According to the Chinese Zodiac, 2020 was the Year of the Rat. But if you look at it from a cyberattack trends perspective, plenty of third parties…
Cybersecurity Awareness Month Isn’t Just for Techies: Tips for Everyone
This month marks the 18th year of Cybersecurity Awareness Month (CSAM) which focuses on helping provide individuals with resources they need to stay safer…
Security Automation Priorities and Challenges: How Do You Compare to Your Peers?
ThreatQuotient’s new survey on the State of Cybersecurity Automation Adoption is now available for download.
Learn How to Detect and Manage External Exposure Risks
The escalation of cyberattacks since early 2020 is requiring many companies to strengthen their security operations. Adversaries are taking advantage of new attack vectors – like IoT devices, insecure…
Help us Celebrate World Rhino Day
For our third year in a row, ThreatQuotient is excited to celebrate World Rhino Day and the remarkable work Helping Rhinos does to help rhinos survive at sustainable levels in their natural habitat.
SANS Report Reveals Significant Growth in Automation: Maximize Your Investments
Let’s face it, we’ve talked about security automation for years. We’ve grappled with what, when and how to automate. We’ve debated the human vs machine topic.
Leveraging MISP and TheHive When You Create Your CTI Practice
For organizations with limited resources or just beginning to build a SecOps practice, MISP and TheHive are easy-to-use tools to help your teams react to malicious threats.
Learn Why Frost & Sullivan Names ThreatQuotient the XDR Competitive Strategy Leader
Extended Detection and Response (XDR) is the latest buzz word in the security industry and garnering significant attention. Industry analysts each have their own definition.
Anatomy of a Supply Chain Attack: How to Accelerate Incident Response and Threat Hunting
In recent months, we’ve seen a sharp rise in software supply chain attacks that infect legitimate applications to distribute malware to users.
Defence Engineering and Threat Intel – No Stone Left Unturned
Frameworks like MITRE ATT&CK provide suggestions about detecting certain types of attacks including where to collect logs from and the pseudo-code required on the system itself, for example, intrusion detection system (IDS) signatures.