BlogEXPERTS SHARING THEIR CYBER THREAT INTELLIGENCE INSIGHTS AND EXPERIENCES
When ThreatQuotient invited me to share how we at Sysdig are using the ThreatQ Platform to enhance our cloud detection and response solutions, I was happy to participate.
If you work in an organization, you’ve probably had to take a cybersecurity training course at some point during your time there.
Recently, ThreatQuotient hosted an interactive discussion regarding security orchestration and cyber security automation adoption – what it is, what it’s meant to do, and why it can present a challenge for security teams to set up and maintain.
In the past year, research indicates that nearly a third of organizations have accelerated their plans to automate key security and IR processes, while another 85% plan on automating them in the next 12 months.
This year’s theme for RSAC was “Transform” and FIC’s theme was “Shaping Europe’s Digital Future.” Although the wording was different, the overarching message was similar.
The threat landscape has escalated over the past two years between the pandemic and the evolving geopolitical environment.
Take a closer look at what a data-driven approach means to the automation of SOC workflows and how it has influenced the product and design decisions of ThreatQ and ThreatQ TDR Orchestrator.
RSAConference 2022 USA hit the nail on the head with this year’s theme: Transform. The global pandemic has transformed every aspect of our lives
Today’s escalating threat landscape means that security operations teams face a multitude of challenges. This can make it challenging for them to keep pace with the sheer scale of threats, tactics and techniques that bad actors frequently use.
It may surprise you to learn that new research by CompTIA finds only 30% of the cyber workforce is in the 19-34 age group, with 52% between 35 and 54.
To help make sense of the cyber threat intelligence landscape, experts from Accenture and ThreatQuotient partnered to provide advice on aligning cyber resilience goals with your
The security landscape is continually changing and the race to stay ahead is often one of both victory and failure.
Maintaining viable rhino populations that have the freedom to roam in their natural habitat, when the pressures on land and natural resources are increasing at such a rapid rate, is a constant challenge.
As the new year continues to unfold, cybersecurity budget holders will be deep into the process of identifying where to allocate funds to best enhance protection against cyberthreats.
Ransomware has dominated the headlines the last couple of years. But it might surprise you to hear that another scourge—business email compromise (BEC)—accounted for 49 times more in losses in 2021.
As people start coming back to the office after working from home exclusively for two years, a hybrid work model will pose a series of challenges for security teams.
We know it is always interesting to get an inside look at how other companies approach security, particularly a security company.
As part of ThreatQuotient’s month-long celebration of women in cybersecurity, today we are recognizing International Women’s Day and this year’s theme – #BreakTheBias.
March is Women’s History Month and Tuesday, March 8 marks International Women’s Day. As is our tradition at ThreatQuotient, we’re celebrating with a month-long recognition of women in cybersecurity.