BlogEXPERTS SHARING THEIR CYBER THREAT INTELLIGENCE INSIGHTS AND EXPERIENCES
As the threat environment continues to intensify, prioritising protection against ransomware and other disruptive cyberattacks will be critical to keeping public sector services operational.
A holistic approach to vulnerability management, that includes knowing yourself and your enemy, allows you to go beyond patching.
Vulnerability management is a challenge for many organizations. If not done efficiently and effectively, it can lead to a data breach.
Unintended consequences – the unforeseen outcomes of actions we take – are all around us. It may be an unforeseen benefit, but, more frequently, it’s an unexpected drawback.
As the 2020 budget meetings come and go – teams are forced to assess their current defenses by analyzing their historical attacks in order to anticipate/predict future attack trends.
The eternal question when making technology investment decisions is whether to invest in people, process or technology.
Threat hunting is a complex task and presents many challenges. If organizations aren’t careful, they can end up with a few high-value resources spending inordinate amounts of time potentially chasing ghosts.
Given that threat hunting is still in its early stages for most companies and teams are relatively small, organizations need to think creatively about how to structure security operations teams and processes to help threat hunters work efficiently.
I’m pleased to announce that ThreatQuotient was named a Northern Virginia Technology Council, 2019 NVTC Tech 100 company of the year.
Government agency computer systems are a treasure trove for threat actors given the vast amount of sensitive information they contain and critical infrastructure they run.
ThreatQuotient Tops Frost & Sullivan’s List of Technology Innovators in the Threat Intelligence Platform Industry
In their recent analysis of threat intelligence platforms, Frost & Sullivan named ThreatQuotient the 2019 Technology Innovation Leader in the sector.
You cannot defend against and respond to what you do not understand. Effective security operations must start with the threat.
Proactivity is now seen by security teams as a viable solution to the challenge of defending enterprises against the ever-growing threat landscape.
Security teams continuously look for ways to mature their process and improve their incident response efforts. Incident pruning should be one of the first activities to consider, however, it is commonly overlooked.
In Part 1 of this series I landed on a recalibrated definition of incident pruning. Now, I want to demonstrate how ThreatQ Investigations can handle both incident thinning and incident deadheading methodologies.
We are extremely proud to announce that ThreatQuotient was named McAfee’s 2019 Security Innovation Alliance (SIA) Global Partner of the Year.
I am honored to announce that earlier this week, ThreatQuotient was named the winner of the inaugural Northern Virginia Technology Council (NVTC) Capital Cyber Awards.
Incident response investigations are complex efforts, shifting between chaos and order, as the incident lead maintains investigation alignment with IR policies, while the team chases down every possible clue leaving no stone unturned.
Gartner projects “by the end of 2022, 30% of organizations with a security team larger than five people will leverage SOAR tools in their security operations, up from less than 5% today.