The ThreatQuotient Blog
EXPERTS SHARING THEIR CYBER THREAT INTELLIGENCE INSIGHTS AND EXPERIENCESUnlock the Power of Security Automation: 3 Use Cases to Consider
At ThreatQuotient, we write a lot about security automation. Most recently, we’ve discussed how our data-driven approach to automation helps enable extended detection and response (XDR) in all phases of security operations including detection, investigation and response.
As the Cyber Threat Environment Escalates, How are Organizations Responding?
Globally, the cyber threat level to organizations remains high and the current situation only serves to highlight this further.
Breaking Barriers at Black Hat 2022 with Women in Cybersecurity
After more than two years of having our days filled with Zoom meetings, many of us in the cybersecurity industry have been eager to get back to in-person events and conferences to reconnect with colleagues and create and strengthen business relationships.
Automation in cybersecurity: overcoming barriers to adoption
“Automation” has become a buzzword in cybersecurity circles. That’s not surprising in an environment where security specialists are in short supply and under intense pressure to defend the business against a huge variety of threats from innumerable different sources.
Correlating Data across Multiple Security Systems and Tools with XDR
To simplify XDR further, it can be broken up into individual components such as EDR, network firewalls, web gateways, IPS and SIEM.
Looking for Some Summer Reading? Check Out Our Top Blogs so Far this Year
Below you’ll find our top three blogs for the first half of 2022 and a brief summary of each. Click on the links that grab your attention and catch up on information you may have missed that can help…
Security Automation, Lessons Learned from Top Gun: Maverick
The cybersecurity industry has talked about security automation for years. We’ve grappled with what, when and how to automate. We’ve debated the human vs machine topic.
Ethics, Design and Cybersecurity
If you work in an organization, you’ve probably had to take a cybersecurity training course at some point during your time there.
The Meaning of Orchestration
Recently, ThreatQuotient hosted an interactive discussion regarding security orchestration and cyber security automation adoption – what it is, what it’s meant to do, and why it can present a challenge for security teams to set up and maintain.
The Current State of Intelligent Automation Adoption in Cybersecurity
In the past year, research indicates that nearly a third of organizations have accelerated their plans to automate key security and IR processes, while another 85% plan on automating them in the next 12 months.
The ThreatQuotient Crash at RSAC and FIC
This year’s theme for RSAC was “Transform” and FIC’s theme was “Shaping Europe’s Digital Future.” Although the wording was different, the overarching message was similar.
Security Tips as Summer Travel Heats Up
The threat landscape has escalated over the past two years between the pandemic and the evolving geopolitical environment.
Reduce Time Or Do Not, There Is No Shift
Take a closer look at what a data-driven approach means to the automation of SOC workflows and how it has influenced the product and design decisions of ThreatQ and ThreatQ TDR Orchestrator.
Transform your Security Operations with ThreatQ – See how at RSAC 2022!
RSAConference 2022 USA hit the nail on the head with this year’s theme: Transform. The global pandemic has transformed every aspect of our lives
Taking a Data-Driven Approach to SOC Operations
Today’s escalating threat landscape means that security operations teams face a multitude of challenges. This can make it challenging for them to keep pace with the sheer scale of threats, tactics and techniques that bad actors frequently use.
Facing Staffing Challenges? The ThreatQ Platform Can Help
It may surprise you to learn that new research by CompTIA finds only 30% of the cyber workforce is in the 19-34 age group, with 52% between 35 and 54.
Achieving Better Business Outcomes Through a CTI Practice
To help make sense of the cyber threat intelligence landscape, experts from Accenture and ThreatQuotient partnered to provide advice on aligning cyber resilience goals with your
XDR best of breed, and how an open architecture will get you there
The security landscape is continually changing and the race to stay ahead is often one of both victory and failure.