The ThreatQuotient Blog
EXPERTS SHARING THEIR CYBER THREAT INTELLIGENCE INSIGHTS AND EXPERIENCESCelebrate Women in Cybersecurity with us this Month
March is Women’s History Month and Tuesday, March 8 marks International Women’s Day. As is our tradition at ThreatQuotient, we’re celebrating with a month-long recognition of women in cybersecurity.
Cyberattacks are Evolving. How to Accelerate Detection and Response with ThreatQ
For some time now, the mantra for security operations centers (SOCs) has been: “It’s not a matter of if, but when and how we’ll be attacked.”
Combat Advanced Threats with a Multi-disciplinary Threat Intelligence Program
Ransomware attacks on Colonial Pipeline, JBS Foods and Kronos are just a few recent examples in the rise of cyber-physical attacks that disrupt lives of individuals…
You Don’t Have to Fall for the “Tinder Swindler” to Get Cheated this Valentine’s Day
The FBI warns that online romance scams have been prevalent during the pandemic as more people look for love online, and the consequences are often financially…
The state of the SOC: skills shortages, automation and gaining context remain a challenge for SOCs
The security operations center (SOC) has been on the front line facing the pandemic-induced escalation of cybersecurity threats in the past eighteen months.
Simplify Your Journey to SOC Modernization
The discipline of threat intelligence began to be incorporated in cyber defense processes within private sector companies nearly a decade ago.
Power the SOC of the Future with the DataLinq Engine – Part 3
In this final blog of the series, we’ll cover the remaining three stages in the DataLinq Engine processing pipeline: Correlate, Prioritize and Translate.
Power the SOC of the Future with the DataLinq Engine – Part 2
To take a strategic approach to using data, we must first deconstruct it, and then merge it into a collective many-to-many relational model that has multiple dimensions.
Power the SOC of the Future with the DataLinq Engine – Part 1
All data is security data because data that provides the context needed to make the best decisions and take the right actions isn’t limited to a few tools and feeds, it’s everywhere.
Run out of Netflix options? Check out our Most Popular Webinars for 2021
In 2021, we covered a lot of important topics and wanted to make sure you didn’t miss our top five webinars for the year.
A Guide to ThreatQuotient’s Top Blogs for 2021
To make sure you don’t miss any “must-read” topics, we’ve compiled our top five blogs for 2021 and provided a brief summary of each so you can scan for areas of interest to you.
The Threat Model as a Compass
The purpose of the Cyber Threat Intelligence (CTI) team is to understand the cyber threat environment and communicate intelligence so that the organisation can make better decisions about lowering cyber risk.
What Does Sun Tzu Have to Do with XDR? More Than You Might Think!
Military general and philosopher Sun Tzu once led the largest armies in the world and authored The Art of War, still considered a masterpiece of tactical warfare and very relevant as we wage our battles against evolving cyberattacks.
Integration of the ThreatQ platform into McAfee Enterprise infrastructure
Proper management of threat data is critical in today’s security operations and modern SOCs. The knowledge of threats, their priority in our environment, their management…
Preparing for the SOC of the Future, Today? We’ve Got You Covered
Last week, we announced v5 of the ThreatQ platform with capabilities needed today to support the security operations center (SOC) of the future.
Elevating What a TIP Can Be – The ThreatQ Platform
In a previous blog I reviewed the foundational use case for a TIP, which is threat intelligence management—the practice of aggregating, analyzing, enriching and de-duplicating internal and external threat data…
Cybersecurity Breakthrough Awards Names ThreatQuotient Security Automation Solution of the Year
We are proud to share with you that the Cybersecurity Breakthrough Awards has recognized ThreatQuotient as the Security Automation Solution of the Year.
5 Best Practices to Get More from Threat Intelligence
As we wrap up Cybersecurity Awareness Month 2021, this week’s theme, Cybersecurity First, is all about making security a priority.