The ThreatQuotient Blog
EXPERTS SHARING THEIR CYBER THREAT INTELLIGENCE INSIGHTS AND EXPERIENCESHow Effective is Threat Hunting for Organizations?
In recent years threat hunting has become much more widely adopted, but today the definition of threat hunting is still quite a controversial topic.
Reducing Enterprise Cyber Risk During COVID-19
When an entire company decides to collectively embrace telework at the same time, over an extended period of time, the result is that business processes must change.
Automate, Adopt, Adapt: How Cyber Threat Intelligence Evolved over the last 12 months
The SANS 2021 Cyber Threat Intelligence (CTI) Survey is now available and, not surprising given the events of last year, the theme of “resilience” comes through loud and clear.
How ThreatQ Helps Bridge the Threat Hunting Skills Gap
The ThreatQ Platform can help bridge the threat hunting skills gap. It provides a single, collaborative environment that can include threat hunters, incident handlers and threat intelligence and SOC analysts.
Implementation of the MITRE ATT&CK Framework
The usefulness of the MITRE ATT&CK framework depends on whether it is implemented effectively and whether security managers have the ability to aggregate and analyze the data in a simple way.
Threat hunting is now pervasive, learn how the ThreatQ Platform helps support your team
At ThreatQuotient, we believe you cannot defend against what you do not understand, so threat intelligence is critical to ensure a SOAR platform is using the right data to execute the right actions.
Understanding Known Adversary Tactics and Techniques
The mapping of the MITRE framework data, summarized as threat information, is ultimately one of the main activities that an IT security department will undertake.
Learn how threat hunting is expanding and evolving in organizations around the world
Adoption of threat hunting has jumped from 75% of organizations in 2018 to 85% of organizations in 2020.
Know More about the Impact of the SolarWinds Breach on your Environment with ThreatQ
When news of a widespread compromise breaks, the ThreatQ Platform helps understand and focus on what’s relevant to your organization, and operationalize that intelligence quickly to strengthen security posture.
OSINT Sources: Trends in the Threat Intelligence Market
When building a threat intelligence library, it is important to determine a methodology that covers all aspects of intelligence, ensuring what is created can be effectively used operationally, tactically, and strategically.
The Evolution of Threat Intelligence Platforms
Threat intelligence has become the lifeblood of security operations. As new use cases emerge, it has become integral to leveraging teams, tools and processes more efficiently and effectively.
The ThreatQ Platform: Powering the XDR Movement
The ThreatQ platform takes a threat-centric approach to security operations because we believe you cannot defend against what you do not understand.
The Integration Imperative for XDR
To help XDR solutions deliver on their promise, what’s needed is a platform focused on integration, serving as a central repository for data and intelligence from internal and external sources.
ThreatQ Integration with Infoblox Accelerates Response to Emerging Threats
Joint customers get more value from their existing investments in Infoblox and ThreatQ. The integration eliminates time-consuming, manual and error-prone tasks.
XDR is a Movement
The largest cybersecurity companies in the world, industry analysts and other security experts are talking about the emergence of XDR solutions.
From the Trenches, Part 2: Working with Employees to Strengthen Security Posture
During COVID-19 and the shift to a remote work environment, employees play an even greater role in helping to protect organizations against cyberattacks.
From the Trenches, Part 1: Security Strategy and a Path To Success
As we wrap up Cybersecurity Awareness Month, I had an opportunity to sit down with ThreatQuotient’s Security Operations Engineer, Aaron Louks.
Do Your Part to Stay Safe Online and Start Using a Password Manager
Cybersecurity Awareness Month 2020 is about taking proactive steps to enhance cybersecurity at home and in the workplace.