NewsPRESS RELEASES, MEDIA COVERAGE AND LATEST UPDATES FROM THREATQUOTIENT
Results identify key factors that are contributing to profound enterprise weaknesses in understanding and operationalizing threat intelligence
Applying Unfiltered Threat Intelligence to Defenses Generates Significant False Positives
“Internet of Things is the ‘thing’ right now — it used to be cloud, then it was mobile. In four or five years from now, it’ll be something else.” – Jonathan Couch
Open and extensible threat intelligence platform recognized for providing customers with a cornerstone solution for efficient threat operations
CR’s second Consumer Voices Survey reveals deep concerns about how info is collected and used.
Late last year, a study by the US National Institute of Standards and Technology (NIST) took an in-depth look at a phenomenon called “security fatigue.”
ThreatQuotient is in the business of intelligence — specifically, providing an open threat-intelligence platform that security teams can look to for information on how attackers are looking to get past their defenses.
Jonathan Couch, vice president of strategy for the cybersecurity firm ThreatQuotient, says one of the best and easiest things to do is to create a long password out of an easy to remember phrase, then throw in some special characters.
In the past few years, the topic of “attribution” has often come up. As more large-scale breaches occur and issues concerning cybersecurity become more mainstream, people want to know who is responsible.
Instead of Discounting Indicators of Compromise, it’s Time to Use Them More Effectively.