Blog
EXPERTS SHARING THEIR CYBER THREAT INTELLIGENCE INSIGHTS AND EXPERIENCES2022, Naughty or Nice?
There were so many notable things that have happened in 2022, here’s some to name a few.
Tis’ the Season to Read the Hottest Topics
If you find yourself searching for something to summarize the year, you’ve come to the right place. We’ve got you covered! We’re going to share some of the best read blogs and best viewed webinars of the year.
Looking under the hood at ROI calculations for Security Automation
Threat actors continue to work faster and show greater sophistication in their tactics, techniques, and procedures (TTPs).
Thinking of a SecOps Platform? Showing ROI Just Got Easier
As threats have continued to evolve, enterprises have made significant investments in security infrastructure and security operations is maturing.
How Sysdig is Using the ThreatQ Platform to Enhance Cloud Threat Detection and Response
When ThreatQuotient invited me to share how we at Sysdig are using the ThreatQ Platform to enhance our cloud detection and response solutions, I was happy to participate.
Budget and momentum are key to cybersecurity automation maturity – and CISOs are feeling left behind
As cyber threats intensify and the human and financial resources available to deal with them remain limited, there is a growing need for automation in cybersecurity.
TIPs to Measure your CTI Program
Nowadays, organizations are exposed to a high volume of security related information. Unfortunately, most of these organizations have little to no capabilities of using this information in a proactive manner, i.e. using information to try to change or anticipate an outcome.
Wrapping up CSAM 2022 with Vulnerability Management Advice for Everyone
According to the 2022 Data Breach Investigations Report (DBIR) from Verizon one of the top paths threat actors use to infiltrate organizations is exploiting vulnerabilities.
Phishing Scams Have Reached New Heights: How to Improve Detection and Response
The Anti-Phishing Working Group (APWG) Phishing Activity Trends Report reveals that in Q2 of 2022 there were 1,097,811 total phishing attacks.
Good Password Hygiene Mitigates Personal and Business Cyber Risk
The first topic we covered was multi-factor authentication (MFA). CSAM’s next topic is using strong passwords. Here are a few tips we have found useful to share with colleagues, as well as family and friends.
Help Enable Smarter Decisions During Cybersecurity Awareness Month
Do a quick search for the top cybersecurity breaches thus far in 2022 and you’ll quickly be overwhelmed with reports of cryptocurrency thefts, attacks targeting multinational corporations and critical infrastructure, nation-state backed attacks, etc
Unlock the Power of Automation: Vulnerability Management
The importance of taking a data-driven approach to Vulnerability Management. In short the efficiency and effectiveness of vulnerability management processes depend heavily on inclusion of threat intelligence for both prioritization and response activities.
Spear Phishing Triage Using ThreatQ and TDR Orchestrator
Our latest industry research – ‘The 2022 State of IT Security Automation Adoption’ – shows strong signs that cybersecurity automation adoption is advancing.
Organizations are traveling the road to cybersecurity automation, but it is not a smooth journey
Our latest industry research – ‘The 2022 State of IT Security Automation Adoption’ – shows strong signs that cybersecurity automation adoption is advancing.
Unlock the Power of Security Automation: Threat Intelligence Management
Threat Intelligence has become a significant input to the overall ecosystem that organizations leverage in their security footprint.
Unlock the Power of Security Automation: 3 Use Cases to Consider
At ThreatQuotient, we write a lot about security automation. Most recently, we’ve discussed how our data-driven approach to automation helps enable extended detection and response (XDR) in all phases of security operations including detection, investigation and response.
As the Cyber Threat Environment Escalates, How are Organizations Responding?
Globally, the cyber threat level to organizations remains high and the current situation only serves to highlight this further.
Breaking Barriers at Black Hat 2022 with Women in Cybersecurity
After more than two years of having our days filled with Zoom meetings, many of us in the cybersecurity industry have been eager to get back to in-person events and conferences to reconnect with colleagues and create and strengthen business relationships.