The ThreatQuotient Blog
EXPERTS SHARING THEIR CYBER THREAT INTELLIGENCE INSIGHTS AND EXPERIENCESMaximizing Efficiency and Effectiveness with ThreatQ Investigations
Organizations in all industries are facing an ever-increasing number of cyber threats. To combat these threats, security teams need to be equipped with powerful tools and technologies…
Expert Advice on Prioritizing, Automating and Collaborating for Threat Detection and Response
In a recent panel discussion led by David Neuman, Sr. Analyst with TAG Cyber, ThreatQuotient’s Dave Krasik, Sr. Director of Product Management and Jessica Bair…
Enhance Threat Detection and Response with Intel DNS
ThreatQuotient and Infoblox recently hosted a webinar, where they demonstrated how the combination of DNS Intel and the use of a Threat Intelligence Platform (TIP) help to improve threat detection and response capabilities.
Using Threat Hunting to Uncover Cybersecurity Threats
In the fast-evolving digital landscape, the prevalence of cyber threats has become a stark reality for businesses and individuals alike. The conventional cybersecurity measures, while essential, are often reactive and inadequate…
Enhancing the Capabilities of National Cyber Agencies
In today’s interconnected digital landscape, cyber threats have become more and more sophisticated and prevalent, posing a huge risk to individuals, organizations, and even nations.
ThreatQ Cyber Forum Recap: Expert Insights on Risk-Based Vulnerability Management
The discipline of vulnerability management has been around for decades and the way we assess risk, based on severity and likelihood of exploitation, has remained fairly constant.
4 Steps to a Comprehensive Security Approach
Software supply chain attacks have become a major concern for organizations in recent years, as cybercriminals increasingly target third-party software components and libraries used to build applications.
What the Financial Sector Needs Now: Risk-Based Vulnerability Management
According to the Verizon 2023 Data Breach Investigations Report, basic web application attacks, which consist largely of leveraging vulnerabilities and stolen credentials to get…
The Speed of Security & AI
We’re all familiar with the “speed of cybersecurity”, the rapid pace at which cyber threats evolve and the corresponding need for timely and agile defense measures. We’ve been trained to understand the importance…
Are You Getting the ROI You Need from Your Security Investments?
The persistent shortage of skilled cybersecurity professionals which grew by 26.2% over the past year, coupled with the fact that global cyberattacks increased 38% in 2022, means organizations are increasingly looking to…
5 Tips For Selecting Your Source of Threat Intelligence Information
In today’s digital world, cybersecurity threats are on the rise, and businesses must stay vigilant to protect their sensitive data from cybercriminals.
Risk-based Vulnerability Management: A Bigger Bang for Your Buck
Every five to ten years, major technology shifts change the way that vulnerability assessment and the related IT risk mitigation processes are approached or implemented.
How Thales Group Uses the ThreatQ Platform to Build its Leading Threat Intelligence Service
In 2016, Ivan Fontarensky, Technical Director CyberDetect & Respond at Thales, wanted to rollout a Cyber Threat Intelligence (CTI) service to continue to add value to the company’s…
Close the Cybersecurity Skills Gap by Investing in the Future
We hear a lot about the cybersecurity skills gap, which the latest research puts at 770,000 open positions in the U.S. and 3.4 million globally.
Security Teams and Limited Resources
Coping with limited resources is a common challenge for security operations teams. Whether it’s due to budget constraints, staffing shortages, or other factors, security teams often need to find ways to do more with less.
ThreatQ v5: An Even Smarter Single Source of Truth
We’ve come a long way since ThreatQ v4 and our own Jay Allmond, UK Threat Intelligence Engineer at ThreatQuotient, recently shared the details during a hands-on webinar that’s now available on-demand.
ThreatQ Academy Drives User Success and Immediate ROI for Clients and Partners
The tech sector, in general, is often far too focused on speeds and feeds to the detriment of the end goal, driving overall customer success.
From Threat Intelligence to Data-Driven Use Cases, the Evolution of Security Automation
Dave Krasik, Director of Product Management at ThreatQuotient, recently had a chance to speak with Ed Amoroso, CEO and founder of TAG Cyber, a leading cybersecurity advisory group, about…