The ThreatQuotient Blog
EXPERTS SHARING THEIR CYBER THREAT INTELLIGENCE INSIGHTS AND EXPERIENCESHelping Rhinos and ThreatQuotient Join Forces to Celebrate the Impacts of Earth Day
Maintaining viable rhino populations that have the freedom to roam in their natural habitat, when the pressures on land and natural resources are increasing at such a rapid rate, is a constant challenge.
The role of Threat Intelligence Platforms in Implementing Extended Detection and Response
As the new year continues to unfold, cybersecurity budget holders will be deep into the process of identifying where to allocate funds to best enhance protection against cyberthreats.
Tax Season Scams Are Here Again – How to Mitigate Risk
Ransomware has dominated the headlines the last couple of years. But it might surprise you to hear that another scourge—business email compromise (BEC)—accounted for 49 times more in losses in 2021.
Privacy and the death of security, what security teams need to know
As people start coming back to the office after working from home exclusively for two years, a hybrid work model will pose a series of challenges for security teams.
An Inside Look at ThreatQuotient’s Own Security Initiatives
We know it is always interesting to get an inside look at how other companies approach security, particularly a security company.
These Women #BreakTheBias, Stopping Threats and Protecting Rhinos
As part of ThreatQuotient’s month-long celebration of women in cybersecurity, today we are recognizing International Women’s Day and this year’s theme – #BreakTheBias.
Celebrate Women in Cybersecurity with us this Month
March is Women’s History Month and Tuesday, March 8 marks International Women’s Day. As is our tradition at ThreatQuotient, we’re celebrating with a month-long recognition of women in cybersecurity.
Cyberattacks are Evolving. How to Accelerate Detection and Response with ThreatQ
For some time now, the mantra for security operations centers (SOCs) has been: “It’s not a matter of if, but when and how we’ll be attacked.”
Combat Advanced Threats with a Multi-disciplinary Threat Intelligence Program
Ransomware attacks on Colonial Pipeline, JBS Foods and Kronos are just a few recent examples in the rise of cyber-physical attacks that disrupt lives of individuals…
You Don’t Have to Fall for the “Tinder Swindler” to Get Cheated this Valentine’s Day
The FBI warns that online romance scams have been prevalent during the pandemic as more people look for love online, and the consequences are often financially…
The state of the SOC: skills shortages, automation and gaining context remain a challenge for SOCs
The security operations center (SOC) has been on the front line facing the pandemic-induced escalation of cybersecurity threats in the past eighteen months.
Simplify Your Journey to SOC Modernization
The discipline of threat intelligence began to be incorporated in cyber defense processes within private sector companies nearly a decade ago.
Power the SOC of the Future with the DataLinq Engine – Part 3
In this final blog of the series, we’ll cover the remaining three stages in the DataLinq Engine processing pipeline: Correlate, Prioritize and Translate.
Power the SOC of the Future with the DataLinq Engine – Part 2
To take a strategic approach to using data, we must first deconstruct it, and then merge it into a collective many-to-many relational model that has multiple dimensions.
Power the SOC of the Future with the DataLinq Engine – Part 1
All data is security data because data that provides the context needed to make the best decisions and take the right actions isn’t limited to a few tools and feeds, it’s everywhere.
Run out of Netflix options? Check out our Most Popular Webinars for 2021
In 2021, we covered a lot of important topics and wanted to make sure you didn’t miss our top five webinars for the year.
A Guide to ThreatQuotient’s Top Blogs for 2021
To make sure you don’t miss any “must-read” topics, we’ve compiled our top five blogs for 2021 and provided a brief summary of each so you can scan for areas of interest to you.
The Threat Model as a Compass
The purpose of the Cyber Threat Intelligence (CTI) team is to understand the cyber threat environment and communicate intelligence so that the organisation can make better decisions about lowering cyber risk.