The ThreatQuotient Blog
EXPERTS SHARING THEIR CYBER THREAT INTELLIGENCE INSIGHTS AND EXPERIENCESUnderstanding Known Adversary Tactics and Techniques
The mapping of the MITRE framework data, summarized as threat information, is ultimately one of the main activities that an IT security department will undertake.
Learn how threat hunting is expanding and evolving in organizations around the world
Adoption of threat hunting has jumped from 75% of organizations in 2018 to 85% of organizations in 2020.
Know More about the Impact of the SolarWinds Breach on your Environment with ThreatQ
When news of a widespread compromise breaks, the ThreatQ Platform helps understand and focus on what’s relevant to your organization, and operationalize that intelligence quickly to strengthen security posture.
OSINT Sources: Trends in the Threat Intelligence Market
When building a threat intelligence library, it is important to determine a methodology that covers all aspects of intelligence, ensuring what is created can be effectively used operationally, tactically, and strategically.
The Evolution of Threat Intelligence Platforms
Threat intelligence has become the lifeblood of security operations. As new use cases emerge, it has become integral to leveraging teams, tools and processes more efficiently and effectively.
The ThreatQ Platform: Powering the XDR Movement
The ThreatQ platform takes a threat-centric approach to security operations because we believe you cannot defend against what you do not understand.
The Integration Imperative for XDR
To help XDR solutions deliver on their promise, what’s needed is a platform focused on integration, serving as a central repository for data and intelligence from internal and external sources.
ThreatQ Integration with Infoblox Accelerates Response to Emerging Threats
Joint customers get more value from their existing investments in Infoblox and ThreatQ. The integration eliminates time-consuming, manual and error-prone tasks.
XDR is a Movement
The largest cybersecurity companies in the world, industry analysts and other security experts are talking about the emergence of XDR solutions.
From the Trenches, Part 2: Working with Employees to Strengthen Security Posture
During COVID-19 and the shift to a remote work environment, employees play an even greater role in helping to protect organizations against cyberattacks.
From the Trenches, Part 1: Security Strategy and a Path To Success
As we wrap up Cybersecurity Awareness Month, I had an opportunity to sit down with ThreatQuotient’s Security Operations Engineer, Aaron Louks.
Do Your Part to Stay Safe Online and Start Using a Password Manager
Cybersecurity Awareness Month 2020 is about taking proactive steps to enhance cybersecurity at home and in the workplace.
SOAR Solutions Take Off. Check out the 2020 Gartner Market Guide
Our approach to SOAR platforms starts with the threat because we believe you cannot defend against what you do not understand.
Phishing Attacks are on the Rise – Do your Part to Mitigate Risk
Even if you’re not a security professional, there are steps you can take to protect yourself and others from these types of attacks.
It’s Back to Basics During Cybersecurity Awareness Month
This month marks the 17th year of Cyber Security Awareness Month, which focuses on helping provide individuals with resources they need to stay safer and more secure online.
5 Tips You Can Start Using Today to Reduce Business Risk
Cyber threat intelligence (CTI), risk management and privacy teams tend to work as siloed operations. But how can they come together – fusing processes and procedures – to achieve more?
ThreatQ Integration with Polarity Gives Analysts Immediate Data Awareness and Recall
One of the many capabilities that sets the ThreatQ platform apart from other security tools and technologies, is our large and adaptable set of integrations.
CTI Recommendations from a Panel of Experts
In the last few years, Cyber Threat Intelligence (CTI) has matured into a standalone program with its own staff, tools and processes.