The ThreatQuotient Blog
EXPERTS SHARING THEIR CYBER THREAT INTELLIGENCE INSIGHTS AND EXPERIENCESSANS CyberThreat: an inside track on Europe’s premier cyber security conference
In January the eyes of the global cyber security community will turn to London as the Cyberthreat conference gets under way.
Defender to Defender: Voice of the Customer Webinar with Sysdig
As more companies move their operations from on-prem to the cloud, they are turning to Sysdig which provides tools to secure containers, Kubernetes, and cloud services.
Is Cybersecurity Automation on Your List of New Year’s Resolutions? 6 Tips to Help
Every year, millions of people make New Year’s resolutions, both personally and professionally, and we all know how difficult resolutions can be to keep. One of the top workplace resolutions cybersecurity professionals are making this year is to pursue security automation initiatives.
2022, Naughty or Nice?
There were so many notable things that have happened in 2022, here’s some to name a few.
Tis’ the Season to Read the Hottest Topics
If you find yourself searching for something to summarize the year, you’ve come to the right place. We’ve got you covered! We’re going to share some of the best read blogs and best viewed webinars of the year.
Looking under the hood at ROI calculations for Security Automation
Threat actors continue to work faster and show greater sophistication in their tactics, techniques, and procedures (TTPs).
Thinking of a SecOps Platform? Showing ROI Just Got Easier
As threats have continued to evolve, enterprises have made significant investments in security infrastructure and security operations is maturing.
How Sysdig is Using the ThreatQ Platform to Enhance Cloud Threat Detection and Response
When ThreatQuotient invited me to share how we at Sysdig are using the ThreatQ Platform to enhance our cloud detection and response solutions, I was happy to participate.
Budget and momentum are key to cybersecurity automation maturity – and CISOs are feeling left behind
As cyber threats intensify and the human and financial resources available to deal with them remain limited, there is a growing need for automation in cybersecurity.
TIPs to Measure your CTI Program
Nowadays, organizations are exposed to a high volume of security related information. Unfortunately, most of these organizations have little to no capabilities of using this information in a proactive manner, i.e. using information to try to change or anticipate an outcome.
Wrapping up CSAM 2022 with Vulnerability Management Advice for Everyone
According to the 2022 Data Breach Investigations Report (DBIR) from Verizon one of the top paths threat actors use to infiltrate organizations is exploiting vulnerabilities.
Phishing Scams Have Reached New Heights: How to Improve Detection and Response
The Anti-Phishing Working Group (APWG) Phishing Activity Trends Report reveals that in Q2 of 2022 there were 1,097,811 total phishing attacks.
Good Password Hygiene Mitigates Personal and Business Cyber Risk
The first topic we covered was multi-factor authentication (MFA). CSAM’s next topic is using strong passwords. Here are a few tips we have found useful to share with colleagues, as well as family and friends.
Help Enable Smarter Decisions During Cybersecurity Awareness Month
Do a quick search for the top cybersecurity breaches thus far in 2022 and you’ll quickly be overwhelmed with reports of cryptocurrency thefts, attacks targeting multinational corporations and critical infrastructure, nation-state backed attacks, etc
Unlock the Power of Automation: Vulnerability Management
The importance of taking a data-driven approach to Vulnerability Management. In short the efficiency and effectiveness of vulnerability management processes depend heavily on inclusion of threat intelligence for both prioritization and response activities.
Spear Phishing Triage Using ThreatQ and TDR Orchestrator
Our latest industry research – ‘The 2022 State of IT Security Automation Adoption’ – shows strong signs that cybersecurity automation adoption is advancing.
Organizations are traveling the road to cybersecurity automation, but it is not a smooth journey
Our latest industry research – ‘The 2022 State of IT Security Automation Adoption’ – shows strong signs that cybersecurity automation adoption is advancing.
Unlock the Power of Security Automation: Threat Intelligence Management
Threat Intelligence has become a significant input to the overall ecosystem that organizations leverage in their security footprint.