The ThreatQuotient Blog
EXPERTS SHARING THEIR CYBER THREAT INTELLIGENCE INSIGHTS AND EXPERIENCESBlog I How threat intelligence can improve vulnerability management outcomes
A data-driven threat intelligence approach is essential as it enables organizations to identify and prioritize vulnerabilities accurately, allocate resources effectively and automate processes…
Blog I Powering visibility, intelligence processing and delivery of quality information for SOC teams
Today’s cyber threats continue to evolve rapidly, and adversaries are constantly reducing the time interval between initial infiltration, lateral movement and compromise. At the same time…
Blog I Building for Cyber Resilience in the Manufacturing Industry
For the third year in a row, manufacturing was the most attacked industry according to IBM X-Force incident response data. Phishing was the top initial infection vector, used in 39% of incidents, and malware was deployed…
Blog I Accelerating Cybersecurity in the Transportation Industry
The transportation industry is not only part of critical infrastructure, but at the nexus of other critical infrastructure sectors that rely on transportation systems to operate reliably. When threat actors put this…
Blog I Selecting the Optimal Threat Intelligence Platform in 5 Steps
To use threat intelligence and data more productively, many organizations are investing in a threat intelligence platform (TIP). Selecting a TIP is important as it will serve as the foundation for your entire security operations…
Blog I Unlocking the Art of Possible: Exploring the ThreatQ Community
In cybersecurity, staying ahead of threats requires not only cutting-edge technology but also a collaborative community of experts. The Art of Possible isn’t just a concept; it’s a mindset that drives innovation…
Blog I Simplifying Security Workflows with ThreatQuotient Automation
It’s not just about speeding up processes; it’s about efficiency, accuracy, and ultimately, staying one step ahead of threats…
Blog I Breaking the cybersecurity automation logjam won’t break the bank
Right now, to boost efficiency and achieve economies of scale, businesses want to automate as much as possible. In back office processes, approaches like Robotic Process…
Blog I Enhancing Cyber Resilience: Safeguarding the Electricity Grid
Digital transformation powers critical infrastructure, the protection of systems is paramount. ThreatQuotient has announced its participation in the vendor affiliate program of the Electricity Information Sharing…
Blog I Leveraging Threat Intelligence for Regulatory Compliance
The US Government recently announced that state-sponsored Chinese cyber group Volt Typhoon has compromised multiple critical infrastructure organisations’ IT networks in the US and is preparing…
Blog I The CISO’s Next Priority Isn’t Technology
In security, we are very used to talking about features and functions in the tools we use. When it comes to measuring the positive impact of what we spend on cyber, in terms of both people and equipment costs…
Women in Cybersecurity – Lydia Grilheres
ThreatQuotient celebrates women in cybersecurity in the month of March. We are honored to celebrate Lydia Grilheres.
Women in Cybersecurity – Jen VanAntwerp
ThreatQuotient celebrates women in cybersecurity in the month of March. We are honored to celebrate Jen VanAntwerp.
Blog I Five ways your business can bridge the cybersecurity skills gaps to find and keep top talent
We hear a lot about the cybersecurity skills gap, which the latest research puts at 3.4 million globally. There are lots of reasons why organizations find themselves dealing…
Women in Cybersecurity – Audrey Amédro
ThreatQuotient celebrates women in cybersecurity in the month of March. We are honored to celebrate Audrey Amédro.
Women in Cybersecurity – Shira Beck
ThreatQuotient celebrates women in cybersecurity in the month of March. We are honored to celebrate Shira Beck.
Women in Cybersecurity – Helen Hopper
ThreatQuotient celebrates women in cybersecurity in the month of March. We are honored to celebrate Helen Hopper.
Blog I Understand how Cyber Threat Intelligence can best leverage the capabilities of network detection and response
Intelligence is now considered essential to the process of identifying, understanding and acting upon threats. According to the “Global…