The ThreatQuotient Blog
EXPERTS SHARING THEIR CYBER THREAT INTELLIGENCE INSIGHTS AND EXPERIENCESInterested in a Career in Cybersecurity? These Tips Can Help Guide Your Journey
In support of this week’s Cybersecurity Awareness Month theme, “Cybersecurity Career Awareness,” I had an opportunity to speak with Dave Stromberg…
Curate and Share Threat Intelligence to Accelerate Security Operations
Over the last several months we’ve seen a tremendous uptick in cyberattacks. Nearly every day, news of another ransomware, supply chain or zero-day attack makes headline news.
2020 Was the Year of the Phish. Let’s Make Sure 2021 Isn’t a Sequel
2020 was the year of the phish. Well, not officially. According to the Chinese Zodiac, 2020 was the Year of the Rat. But if you look at it from a cyberattack trends perspective, plenty of third parties…
Cybersecurity Awareness Month Isn’t Just for Techies: Tips for Everyone
This month marks the 18th year of Cybersecurity Awareness Month (CSAM) which focuses on helping provide individuals with resources they need to stay safer…
Security Automation Priorities and Challenges: How Do You Compare to Your Peers?
ThreatQuotient’s new survey on the State of Cybersecurity Automation Adoption is now available for download.
Learn How to Detect and Manage External Exposure Risks
The escalation of cyberattacks since early 2020 is requiring many companies to strengthen their security operations. Adversaries are taking advantage of new attack vectors – like IoT devices, insecure…
Help us Celebrate World Rhino Day
For our third year in a row, ThreatQuotient is excited to celebrate World Rhino Day and the remarkable work Helping Rhinos does to help rhinos survive at sustainable levels in their natural habitat.
SANS Report Reveals Significant Growth in Automation: Maximize Your Investments
Let’s face it, we’ve talked about security automation for years. We’ve grappled with what, when and how to automate. We’ve debated the human vs machine topic.
Leveraging MISP and TheHive When You Create Your CTI Practice
For organizations with limited resources or just beginning to build a SecOps practice, MISP and TheHive are easy-to-use tools to help your teams react to malicious threats.
Learn Why Frost & Sullivan Names ThreatQuotient the XDR Competitive Strategy Leader
Extended Detection and Response (XDR) is the latest buzz word in the security industry and garnering significant attention. Industry analysts each have their own definition.
Anatomy of a Supply Chain Attack: How to Accelerate Incident Response and Threat Hunting
In recent months, we’ve seen a sharp rise in software supply chain attacks that infect legitimate applications to distribute malware to users.
Defence Engineering and Threat Intel – No Stone Left Unturned
Frameworks like MITRE ATT&CK provide suggestions about detecting certain types of attacks including where to collect logs from and the pseudo-code required on the system itself, for example, intrusion detection system (IDS) signatures.
Are You Prepared to Better Protect Against SANS’ Top Attacks and Threats?
The SANS 2021 Top New Attacks and Threat Report is now available for download, covering the security trends and top threats to watch for as the world emerges from the pandemic.
Threat Intelligence Management – the Foundational Use Case for a TIP
Threat Intelligence Platforms (TIPs) allow you to gain better intelligence across the threat spectrum from known to unknown attacks and leverage this intelligence to optimize threat detection and response, preemptive blocking, and patch prioritization.
How to Assess and Up-level Your Organization’s Maturity for SOAR, Gartner’s Take
If you’ve been in the security industry for any length of time, you know that there are no “silver bullet” solutions. The same can be said about SOAR tools.
Are You Prepared for the Surge in Ransomware?
Incidents of ransomware have been increasing and evolving steadily for years as financially motivated adversaries shift tactics when one is no longer profitable. Unfortunately, many organizations haven’t been able to adapt their security operations to keep up.
ThreatQ Data Exchange Unlocks the Value of Industry Threat Intelligence Sharing
There’s no doubt that an analyst’s ability to efficiently share curated threat intelligence has a significant impact on the success of their organization’s overall security operations.
5 Tips to Improve Threat Report Analysis and Action
When shared the right way with each part of the organization, key stakeholders will see threat intelligence for the business enabler that it is, and the threat intelligence program will gain support and the budget to grow.