BlogEXPERTS SHARING THEIR CYBER THREAT INTELLIGENCE INSIGHTS AND EXPERIENCES
One of the many capabilities that sets the ThreatQ platform apart from other security tools and technologies, is our large and adaptable set of integrations that allow you to easily customize ThreatQ to meet the requirements of your unique environment.
At the helm of their security organization and often in the “hot seat”, CISOs can feel alone as they try to understand the rapidly evolving external threat landscape and focus on what truly matters.
Security teams continue to face significant alert fatigue from a continual barrage of high priority alerts. The expanding threat landscape and the increasingly dynamic nature of IT operations are the primary contributors to this alert escalation.
Now that CTI has matured into a standalone program, this year the SANS survey asked specific questions about how organizations are setting up their CTI programs.
The use of cyber threat intelligence (CTI) within the security industry is widespread and increasing over time. Attackers change their methods frequently to avoid detection by defenders who use CTI.
The global shortage of cybersecurity professionals has now surpassed 4 million according to ISC2, yet the volume and velocity of increasingly sophisticated threats security teams face is on the rise.
There are two types of cyber threats that organizations deal with which can be sorted into the following categories: hurricanes and earthquakes.
When senior professionals were asked about their rise to leadership, they cite being in the right place at the right time, their experience and certifications (including staying current) as the top three reasons.
In our continuing program this month to celebrate women in cybersecurity, I wanted to tell you about an amazing group of women who have put a new twist on threat hunting.
Sunday, March 8 is International Women’s Day, and in the U.S. the entire month of March is Women’s History Month. So, ThreatQuotient is taking the opportunity to celebrate women in cybersecurity.
RSA Conference 2020 is approaching fast and here at ThreatQuotient we’re excited for two main reasons.
A holistic approach to vulnerability management, that includes knowing yourself and your enemy, allows you to go beyond patching.
Vulnerability management is a challenge for many organizations. If not done efficiently and effectively, it can lead to a data breach.
Unintended consequences – the unforeseen outcomes of actions we take – are all around us. It may be an unforeseen benefit, but, more frequently, it’s an unexpected drawback.
As the 2020 budget meetings come and go – teams are forced to assess their current defenses by analyzing their historical attacks in order to anticipate/predict future attack trends.
The eternal question when making technology investment decisions is whether to invest in people, process or technology.
Threat hunting is a complex task and presents many challenges. If organizations aren’t careful, they can end up with a few high-value resources spending inordinate amounts of time potentially chasing ghosts.
Given that threat hunting is still in its early stages for most companies and teams are relatively small, organizations need to think creatively about how to structure security operations teams and processes to help threat hunters work efficiently.
I’m pleased to announce that ThreatQuotient was named a Northern Virginia Technology Council, 2019 NVTC Tech 100 company of the year.