The ThreatQuotient Blog
EXPERTS SHARING THEIR CYBER THREAT INTELLIGENCE INSIGHTS AND EXPERIENCESHow Sysdig is Using the ThreatQ Platform to Enhance Cloud Threat Detection and Response
When ThreatQuotient invited me to share how we at Sysdig are using the ThreatQ Platform to enhance our cloud detection and response solutions, I was happy to participate.
Budget and momentum are key to cybersecurity automation maturity – and CISOs are feeling left behind
As cyber threats intensify and the human and financial resources available to deal with them remain limited, there is a growing need for automation in cybersecurity.
TIPs to Measure your CTI Program
Nowadays, organizations are exposed to a high volume of security related information. Unfortunately, most of these organizations have little to no capabilities of using this information in a proactive manner, i.e. using information to try to change or anticipate an outcome.
Wrapping up CSAM 2022 with Vulnerability Management Advice for Everyone
According to the 2022 Data Breach Investigations Report (DBIR) from Verizon one of the top paths threat actors use to infiltrate organizations is exploiting vulnerabilities.
Phishing Scams Have Reached New Heights: How to Improve Detection and Response
The Anti-Phishing Working Group (APWG) Phishing Activity Trends Report reveals that in Q2 of 2022 there were 1,097,811 total phishing attacks.
Good Password Hygiene Mitigates Personal and Business Cyber Risk
The first topic we covered was multi-factor authentication (MFA). CSAM’s next topic is using strong passwords. Here are a few tips we have found useful to share with colleagues, as well as family and friends.
Help Enable Smarter Decisions During Cybersecurity Awareness Month
Do a quick search for the top cybersecurity breaches thus far in 2022 and you’ll quickly be overwhelmed with reports of cryptocurrency thefts, attacks targeting multinational corporations and critical infrastructure, nation-state backed attacks, etc
Unlock the Power of Automation: Vulnerability Management
The importance of taking a data-driven approach to Vulnerability Management. In short the efficiency and effectiveness of vulnerability management processes depend heavily on inclusion of threat intelligence for both prioritization and response activities.
Spear Phishing Triage Using ThreatQ and TDR Orchestrator
Our latest industry research – ‘The 2022 State of IT Security Automation Adoption’ – shows strong signs that cybersecurity automation adoption is advancing.
Organizations are traveling the road to cybersecurity automation, but it is not a smooth journey
Our latest industry research – ‘The 2022 State of IT Security Automation Adoption’ – shows strong signs that cybersecurity automation adoption is advancing.
Unlock the Power of Security Automation: Threat Intelligence Management
Threat Intelligence has become a significant input to the overall ecosystem that organizations leverage in their security footprint.
Unlock the Power of Security Automation: 3 Use Cases to Consider
At ThreatQuotient, we write a lot about security automation. Most recently, we’ve discussed how our data-driven approach to automation helps enable extended detection and response (XDR) in all phases of security operations including detection, investigation and response.
As the Cyber Threat Environment Escalates, How are Organizations Responding?
Globally, the cyber threat level to organizations remains high and the current situation only serves to highlight this further.
Breaking Barriers at Black Hat 2022 with Women in Cybersecurity
After more than two years of having our days filled with Zoom meetings, many of us in the cybersecurity industry have been eager to get back to in-person events and conferences to reconnect with colleagues and create and strengthen business relationships.
Automation in cybersecurity: overcoming barriers to adoption
“Automation” has become a buzzword in cybersecurity circles. That’s not surprising in an environment where security specialists are in short supply and under intense pressure to defend the business against a huge variety of threats from innumerable different sources.
Correlating Data across Multiple Security Systems and Tools with XDR
To simplify XDR further, it can be broken up into individual components such as EDR, network firewalls, web gateways, IPS and SIEM.
Looking for Some Summer Reading? Check Out Our Top Blogs so Far this Year
Below you’ll find our top three blogs for the first half of 2022 and a brief summary of each. Click on the links that grab your attention and catch up on information you may have missed that can help…
Security Automation, Lessons Learned from Top Gun: Maverick
The cybersecurity industry has talked about security automation for years. We’ve grappled with what, when and how to automate. We’ve debated the human vs machine topic.