The ThreatQuotient Blog
EXPERTS SHARING THEIR CYBER THREAT INTELLIGENCE INSIGHTS AND EXPERIENCESFacing Staffing Challenges? The ThreatQ Platform Can Help
It may surprise you to learn that new research by CompTIA finds only 30% of the cyber workforce is in the 19-34 age group, with 52% between 35 and 54.
Achieving Better Business Outcomes Through a CTI Practice
To help make sense of the cyber threat intelligence landscape, experts from Accenture and ThreatQuotient partnered to provide advice on aligning cyber resilience goals with your
XDR best of breed, and how an open architecture will get you there
The security landscape is continually changing and the race to stay ahead is often one of both victory and failure.
Helping Rhinos and ThreatQuotient Join Forces to Celebrate the Impacts of Earth Day
Maintaining viable rhino populations that have the freedom to roam in their natural habitat, when the pressures on land and natural resources are increasing at such a rapid rate, is a constant challenge.
The role of Threat Intelligence Platforms in Implementing Extended Detection and Response
As the new year continues to unfold, cybersecurity budget holders will be deep into the process of identifying where to allocate funds to best enhance protection against cyberthreats.
Tax Season Scams Are Here Again – How to Mitigate Risk
Ransomware has dominated the headlines the last couple of years. But it might surprise you to hear that another scourge—business email compromise (BEC)—accounted for 49 times more in losses in 2021.
Privacy and the death of security, what security teams need to know
As people start coming back to the office after working from home exclusively for two years, a hybrid work model will pose a series of challenges for security teams.
An Inside Look at ThreatQuotient’s Own Security Initiatives
We know it is always interesting to get an inside look at how other companies approach security, particularly a security company.
These Women #BreakTheBias, Stopping Threats and Protecting Rhinos
As part of ThreatQuotient’s month-long celebration of women in cybersecurity, today we are recognizing International Women’s Day and this year’s theme – #BreakTheBias.
Celebrate Women in Cybersecurity with us this Month
March is Women’s History Month and Tuesday, March 8 marks International Women’s Day. As is our tradition at ThreatQuotient, we’re celebrating with a month-long recognition of women in cybersecurity.
Cyberattacks are Evolving. How to Accelerate Detection and Response with ThreatQ
For some time now, the mantra for security operations centers (SOCs) has been: “It’s not a matter of if, but when and how we’ll be attacked.”
Combat Advanced Threats with a Multi-disciplinary Threat Intelligence Program
Ransomware attacks on Colonial Pipeline, JBS Foods and Kronos are just a few recent examples in the rise of cyber-physical attacks that disrupt lives of individuals…
You Don’t Have to Fall for the “Tinder Swindler” to Get Cheated this Valentine’s Day
The FBI warns that online romance scams have been prevalent during the pandemic as more people look for love online, and the consequences are often financially…
The state of the SOC: skills shortages, automation and gaining context remain a challenge for SOCs
The security operations center (SOC) has been on the front line facing the pandemic-induced escalation of cybersecurity threats in the past eighteen months.
Simplify Your Journey to SOC Modernization
The discipline of threat intelligence began to be incorporated in cyber defense processes within private sector companies nearly a decade ago.
Power the SOC of the Future with the DataLinq Engine – Part 3
In this final blog of the series, we’ll cover the remaining three stages in the DataLinq Engine processing pipeline: Correlate, Prioritize and Translate.
Power the SOC of the Future with the DataLinq Engine – Part 2
To take a strategic approach to using data, we must first deconstruct it, and then merge it into a collective many-to-many relational model that has multiple dimensions.
Power the SOC of the Future with the DataLinq Engine – Part 1
All data is security data because data that provides the context needed to make the best decisions and take the right actions isn’t limited to a few tools and feeds, it’s everywhere.