The ThreatQuotient Blog
EXPERTS SHARING THEIR CYBER THREAT INTELLIGENCE INSIGHTS AND EXPERIENCESJoin ThreatQ’s Gigi Schumm at Uniting Women in Cyber on March 29
According to a Forbes article published in January of this year, women comprise roughly 10% of the cybersecurity workforce. Historically, the number of women in technology companies has been low and the cybersecurity sector is no exception.
How ThreatQ helps Incident Response Teams Disarm Threat Actors Faster
As an incident responder you’re the last tier of defense for an organization, charged with detecting and stopping threat actors that have infiltrated your organization as quickly as possible to mitigate damage.
Behind a Mystery Nation
Have you ever seen a satellite image shows North Korea compared to its neighbors when pieced together? North Korea is so secretive you can’t even see it from space!
Digital Threat Intelligence Management Brings Better Signal and Less Noise
Nearly one billion personal records and just over one billion credentials were stolen in 2016, with similar statistics in 2017.
Insider Threat: Focusing From The Inside Out
In Flashpoint’s latest blog post, Séan McGurk and ThreatQuotient’s Jonathan Couch talk about insider threat challenges, mitigations, and best practices.
Enhancing threat intelligence services through collaboration
The reality of cybersecurity today is that adversaries are always advancing, which means that, as defenders, we must continue to advance the state of security operations and management.
Hitting the Trifecta – More Recognition from CRN
As CRN describes the recognition, the Channel Chiefs list honors the best of the best – leaders who build, support and deliver superior partner programs and strategy. Those making the list are chosen by CRN editors based on their track record of channel accomplishments.
Polarity and ThreatQ Integration
In Polarity’s latest collaboration, they teamed up with ThreatQuotient to build a seriously powerful threat intelligence combination.
Waking up to Critical Infrastructure Threats
“Without change, something sleeps inside us, and seldom awakens. The sleeper must awaken.” This quote from Dune is one of my favorites because it speaks so well to the phenomenon we see around cyber attacks, particularly those targeting critical infrastructure.
How ThreatQ Helps SOCs Streamline Tasks to Focus on Higher Priority Threats
Alexander Graham Bell said, “Before anything else, preparation is the key to success.”
Attribution – One size doesn’t fit all
When it comes to security operations, you need to consider what level of attribution the different teams involved in protecting your organization need to be successful. Often knowing the group responsible or the campaign used is sufficient.
What does a truly Flexible Threat Intelligence Platform look like?
Working in a new market is always an interesting experience. I am reminded of this every time I go out to a trade show and quickly get the question: “So, what do you guys do?”
Animals Adapt their Defenses Based on Predators – We Must Too
Some animals bet on speed, others on protective shells, others on camouflage, the list goes on and on. Inventiveness is limitless but the objective is consistent: defend against “THE” main predator of the species concerned.
How ThreatQ Helps CISOs Empower Their Teams to Mitigate Risk
As breaches continue to dominate the headlines, affecting organizations of all sizes, in all industries and around the world, the pressure is high for C-level executives.
What is a Threat Library?
The first thought that comes to mind is that these are two terms really don’t belong together. A dangerous library? Why would I go there?
Statistics and Threat Intelligence
The joke is that “12 out of 10 Americans don’t believe in statistics.” But we still use statistics when looking at Amazon rating scores, watching the weather forecast, or during election cycles.
Threat Intelligence: Music or Noise?
There are a lot of similarities between threat intelligence and the music world. Threat intelligence is made up of multiple, aggregated threat data points (music notes) turned into relevant intelligence for your organization (your own music track).
Accelerating Our Mission to Never Stop Innovating
When executives see the latest breach headlines, the first thing they want to know is how their organization might be impacted, and what their security teams are doing about it.