The ThreatQuotient Blog
EXPERTS SHARING THEIR CYBER THREAT INTELLIGENCE INSIGHTS AND EXPERIENCESCTI Recommendations from a Panel of Experts
In the last few years, Cyber Threat Intelligence (CTI) has matured into a standalone program with its own staff, tools and processes.
Are You Maximizing MITRE ATT&CK? Insights from the new SANS Whitepaper Will Help
The MITRE ATT&CK framework has become a game-changing tool for security teams to assess their organization’s security posture vis-á-vis specific attack methods.
Spike in Cloud Attacks Shows Businesses were not Prepared to Work from Home
As more and more remote employees place vital data into the cloud, this creates more entry points that are vulnerable and open for cyber attackers to exploit.
Evaluating Threat Intelligence Solutions? Download the New Gartner Market Guide
ThreatQuotient approaches SOAR by starting with the threat because we believe you cannot defend against what you do not understand.
See How a Security Team Delivers on the CISO’s Directive to Mitigate Risks from Emerging Threats
During times of crisis and major events, opportunistic cyber criminals take advantage of human nature to launch attacks.
How Airbus CyberSecurity is Scaling and Enriching Threat Intelligence with ThreatQ
Nearly a decade ago Airbus Cybersecurity identified and tapped into a growing need for threat intelligence services.
Government agencies under attack: How a SOC can protect against cyber threats
Traditionally, large companies have been the main targets of hackers, as they attract potentially high ransom money.
Lack of experts in cyber security
It is no secret that organizations are increasingly lacking cyber security experts. This applies not only to large companies, but also to government agencies, which are facing increasing threats.
Orchestration and Threat Intelligence – Engine and Fuel
Both orchestration tools and a threat intelligence platform serve the same high-level goal: Optimize people’s time so they can focus on areas where their intelligence, experience and skills are needed.
Combating the Threat Landscape in the Public Sector
As the threat environment continues to intensify, prioritising protection against ransomware and other disruptive cyberattacks will be critical to keeping public sector services operational.
Maturing Approach as Cyber Threat Intelligence Pays Dividends
In the battle to protect businesses from relentless attempts at infiltration, theft and disruption by cybercriminals, knowledge is power.
Do You Want to be a Cybersecurity Top Gun?
The term “top gun” has two meanings. Loosely, it means to be the best of the best in a certain field. However, it is also the nickname for the elite U.S. Navy Strike Fighter Tactics Instructor program aimed at creating world-class fighter pilots.
The Road to a Next Generation Security Operations Capability
We can all agree that threat intelligence plays a central role in the SOC. As you look for a solution to help you collect and correlate external and internal threat intelligence for analysis and action, there are many factors to consider.
How Security Analysts Can Collaborate while Working Remotely
Without the ability to catch up with co-workers in person, go out to lunch or grab a cup of coffee, you might think employees would be more focused. The reality is that most are distracted for a variety of reasons.
Not a COVID-19 Blog Post Part 3
For any platform or product to exist in our market category, the ability to rapidly integrate is critical for its own success, and for the success of its users.
Not a COVID-19 Blog Post Part 2
Agility, sustainability and accessibility make a good product, but rapid integrations and customizations during crises make a great one.
Not a COVID-19 Blog Post Part 1
Leon Ward, VP of Product Management, shares his top 5 tips on how best to use ThreatQ to track COVID-19 related threat activity.
Attention CISOs: Get Answers to Your Top Questions
At the helm of their security organization and often in the “hot seat”, CISOs can feel alone as they try to understand the rapidly evolving external threat landscape and focus on what truly matters.