The ThreatQuotient Blog
EXPERTS SHARING THEIR CYBER THREAT INTELLIGENCE INSIGHTS AND EXPERIENCESHow Security Analysts Can Collaborate while Working Remotely
Without the ability to catch up with co-workers in person, go out to lunch or grab a cup of coffee, you might think employees would be more focused. The reality is that most are distracted for a variety of reasons.
Not a COVID-19 Blog Post Part 3
For any platform or product to exist in our market category, the ability to rapidly integrate is critical for its own success, and for the success of its users.
Not a COVID-19 Blog Post Part 2
Agility, sustainability and accessibility make a good product, but rapid integrations and customizations during crises make a great one.
Not a COVID-19 Blog Post Part 1
Leon Ward, VP of Product Management, shares his top 5 tips on how best to use ThreatQ to track COVID-19 related threat activity.
Attention CISOs: Get Answers to Your Top Questions
At the helm of their security organization and often in the “hot seat”, CISOs can feel alone as they try to understand the rapidly evolving external threat landscape and focus on what truly matters.
Making Better Security Decisions…Faster!
Security teams continue to face significant alert fatigue from a continual barrage of high priority alerts. The expanding threat landscape and the increasingly dynamic nature of IT operations are the primary contributors to this alert escalation.
Learn What 1,000 of Your Peers are Saying About Cyber Threat Intelligence
Now that CTI has matured into a standalone program, this year the SANS survey asked specific questions about how organizations are setting up their CTI programs.
Are you maximizing the value of your cyber threat intelligence investment?
The use of cyber threat intelligence (CTI) within the security industry is widespread and increasing over time. Attackers change their methods frequently to avoid detection by defenders who use CTI.
See how to Enhance Orchestration using Threat Intelligence
The global shortage of cybersecurity professionals has now surpassed 4 million according to ISC2, yet the volume and velocity of increasingly sophisticated threats security teams face is on the rise.
Threat Intelligence Decoded
There are two types of cyber threats that organizations deal with which can be sorted into the following categories: hurricanes and earthquakes.
New Research Uncovers Keys to Success for Women in Cybersecurity
When senior professionals were asked about their rise to leadership, they cite being in the right place at the right time, their experience and certifications (including staying current) as the top three reasons.
Celebrating a New Twist on Women Threat Hunters
In our continuing program this month to celebrate women in cybersecurity, I wanted to tell you about an amazing group of women who have put a new twist on threat hunting.
Join us in Celebrating Women in Cybersecurity this Month
Sunday, March 8 is International Women’s Day, and in the U.S. the entire month of March is Women’s History Month. So, ThreatQuotient is taking the opportunity to celebrate women in cybersecurity.
Countdown to RSA Conference 2020
RSA Conference 2020 is approaching fast and here at ThreatQuotient we’re excited for two main reasons.
If You’re Only Focused on Patching, You’re Not Doing Vulnerability Management
A holistic approach to vulnerability management, that includes knowing yourself and your enemy, allows you to go beyond patching.
See How to Leverage Threat Intelligence for Effective Vulnerability Management
Vulnerability management is a challenge for many organizations. If not done efficiently and effectively, it can lead to a data breach.
Struggling to Make Better Security Decisions? These Tips Can Help
Unintended consequences – the unforeseen outcomes of actions we take – are all around us. It may be an unforeseen benefit, but, more frequently, it’s an unexpected drawback.
Cyber Predictions for 2020
As the 2020 budget meetings come and go – teams are forced to assess their current defenses by analyzing their historical attacks in order to anticipate/predict future attack trends.