The ThreatQuotient Blog
EXPERTS SHARING THEIR CYBER THREAT INTELLIGENCE INSIGHTS AND EXPERIENCESSOAR Solutions Take Off. Check out the 2020 Gartner Market Guide
Our approach to SOAR platforms starts with the threat because we believe you cannot defend against what you do not understand.
Phishing Attacks are on the Rise – Do your Part to Mitigate Risk
Even if you’re not a security professional, there are steps you can take to protect yourself and others from these types of attacks.
It’s Back to Basics During Cybersecurity Awareness Month
This month marks the 17th year of Cyber Security Awareness Month, which focuses on helping provide individuals with resources they need to stay safer and more secure online.
5 Tips You Can Start Using Today to Reduce Business Risk
Cyber threat intelligence (CTI), risk management and privacy teams tend to work as siloed operations. But how can they come together – fusing processes and procedures – to achieve more?
ThreatQ Integration with Polarity Gives Analysts Immediate Data Awareness and Recall
One of the many capabilities that sets the ThreatQ platform apart from other security tools and technologies, is our large and adaptable set of integrations.
CTI Recommendations from a Panel of Experts
In the last few years, Cyber Threat Intelligence (CTI) has matured into a standalone program with its own staff, tools and processes.
Are You Maximizing MITRE ATT&CK? Insights from the new SANS Whitepaper Will Help
The MITRE ATT&CK framework has become a game-changing tool for security teams to assess their organization’s security posture vis-á-vis specific attack methods.
Spike in Cloud Attacks Shows Businesses were not Prepared to Work from Home
As more and more remote employees place vital data into the cloud, this creates more entry points that are vulnerable and open for cyber attackers to exploit.
Evaluating Threat Intelligence Solutions? Download the New Gartner Market Guide
ThreatQuotient approaches SOAR by starting with the threat because we believe you cannot defend against what you do not understand.
See How a Security Team Delivers on the CISO’s Directive to Mitigate Risks from Emerging Threats
During times of crisis and major events, opportunistic cyber criminals take advantage of human nature to launch attacks.
How Airbus CyberSecurity is Scaling and Enriching Threat Intelligence with ThreatQ
Nearly a decade ago Airbus Cybersecurity identified and tapped into a growing need for threat intelligence services.
Government agencies under attack: How a SOC can protect against cyber threats
Traditionally, large companies have been the main targets of hackers, as they attract potentially high ransom money.
Lack of experts in cyber security
It is no secret that organizations are increasingly lacking cyber security experts. This applies not only to large companies, but also to government agencies, which are facing increasing threats.
Orchestration and Threat Intelligence – Engine and Fuel
Both orchestration tools and a threat intelligence platform serve the same high-level goal: Optimize people’s time so they can focus on areas where their intelligence, experience and skills are needed.
Combating the Threat Landscape in the Public Sector
As the threat environment continues to intensify, prioritising protection against ransomware and other disruptive cyberattacks will be critical to keeping public sector services operational.
Maturing Approach as Cyber Threat Intelligence Pays Dividends
In the battle to protect businesses from relentless attempts at infiltration, theft and disruption by cybercriminals, knowledge is power.
Do You Want to be a Cybersecurity Top Gun?
The term “top gun” has two meanings. Loosely, it means to be the best of the best in a certain field. However, it is also the nickname for the elite U.S. Navy Strike Fighter Tactics Instructor program aimed at creating world-class fighter pilots.
The Road to a Next Generation Security Operations Capability
We can all agree that threat intelligence plays a central role in the SOC. As you look for a solution to help you collect and correlate external and internal threat intelligence for analysis and action, there are many factors to consider.