The ThreatQuotient Blog
EXPERTS SHARING THEIR CYBER THREAT INTELLIGENCE INSIGHTS AND EXPERIENCESHow Thales Group Uses the ThreatQ Platform to Build its Leading Threat Intelligence Service
In 2016, Ivan Fontarensky, Technical Director CyberDetect & Respond at Thales, wanted to rollout a Cyber Threat Intelligence (CTI) service to continue to add value to the company’s…
Close the Cybersecurity Skills Gap by Investing in the Future
We hear a lot about the cybersecurity skills gap, which the latest research puts at 770,000 open positions in the U.S. and 3.4 million globally.
Security Teams and Limited Resources
Coping with limited resources is a common challenge for security operations teams. Whether it’s due to budget constraints, staffing shortages, or other factors, security teams often need to find ways to do more with less.
ThreatQ v5: An Even Smarter Single Source of Truth
We’ve come a long way since ThreatQ v4 and our own Jay Allmond, UK Threat Intelligence Engineer at ThreatQuotient, recently shared the details during a hands-on webinar that’s now available on-demand.
ThreatQ Academy Drives User Success and Immediate ROI for Clients and Partners
The tech sector, in general, is often far too focused on speeds and feeds to the detriment of the end goal, driving overall customer success.
From Threat Intelligence to Data-Driven Use Cases, the Evolution of Security Automation
Dave Krasik, Director of Product Management at ThreatQuotient, recently had a chance to speak with Ed Amoroso, CEO and founder of TAG Cyber, a leading cybersecurity advisory group, about…
How to Find Your Source of Truth
Cybersecurity automation is a hot topic as organizations wrestle with the challenges of increasing attack volumes, cybersecurity skill shortages, and how to make the best use of limited resources to protect the enterprise.
How ThreatQ Embodies RSAC 2023 Theme: Stronger Together
Cybersecurity automation is a hot topic as organizations wrestle with the challenges of increasing attack volumes, cybersecurity skill shortages, and how to make the best use of limited resources to protect the enterprise.
Cyber-Physical Systems Attacks and Saving Rhinos: The Ultimate Comic Book
Over the years, cybersecurity has been the subject of blockbuster movies, page-turning novels, shocking memoirs and mind-boggling documentaries. And it remains a fascinating…
Women in Cybersecurity – Olivia Henderson
There’s a lot to be proud of as part of the ThreatQuotient Crash, but one thing I’m particularly proud of is our commitment to recognizing and encouraging women in cybersecurity.
Women in Cybersecurity – Kailyn Johnson
There’s a lot to be proud of as part of the ThreatQuotient Crash, but one thing I’m particularly proud of is our commitment to recognizing and encouraging women in cybersecurity.
Women in Cybersecurity – V. Costa-Gazcón
There’s a lot to be proud of as part of the ThreatQuotient Crash, but one thing I’m particularly proud of is our commitment to recognizing and encouraging women in cybersecurity.
Women in Cybersecurity – Stacey Antonino
There’s a lot to be proud of as part of the ThreatQuotient Crash, but one thing I’m particularly proud of is our commitment to recognizing and encouraging women in cybersecurity.
Women in Cybersecurity – Jana Lind
There’s a lot to be proud of as part of the ThreatQuotient Crash, but one thing I’m particularly proud of is our commitment to recognizing and encouraging women in cybersecurity.
Women in Cybersecurity – Celine Gajnik-Kinnoo
There’s a lot to be proud of as part of the ThreatQuotient Crash, but one thing I’m particularly proud of is our commitment to recognizing and encouraging women in cybersecurity.
International Women’s Day – Nocry Mzimba
There’s a lot to be proud of as part of the ThreatQuotient Crash, but one thing I’m particularly proud of is our commitment to recognizing and encouraging women in cybersecurity.
Celebrate Women in Cybersecurity with Us!
There’s a lot to be proud of as part of the ThreatQuotient Crash, but one thing I’m particularly proud of is our commitment to recognizing and encouraging women in cybersecurity.
Importance of great communication
In all relationships, issues can arise. The key to solving those issues is to have a clear understanding of the issue itself. For instance, when a customer reports an issue it is critical to listen to the customer with patience and empathy so that they feel understood, and to assure them that they will receive assistance promptly.