BlogEXPERTS SHARING THEIR CYBER THREAT INTELLIGENCE INSIGHTS AND EXPERIENCES
For our third year in a row, ThreatQuotient is excited to celebrate World Rhino Day and the remarkable work Helping Rhinos does to help rhinos survive at sustainable levels in their natural habitat.
On the heels of announcing the closing of $22.5 million in new financing as a result of strong performance in 2020, I’m proud of our team’s latest innovation that we’re announcing today, ThreatQ TDR Orchestrator.
Organizations are looking to improve their security operations effectiveness, efficiency, and staff satisfaction, with Security, Orchestration, Automation and Response (SOAR).
The spike in cyber breaches in the past year, compounded by COVID-related attacks, has only increased the importance of cyber threat intelligence (CTI).
The beginning of the year is always full of “bests and worsts” from the prior year, as well as predictions.
March is Women’s History Month and today is International Women’s Day with this year’s theme being “choose to challenge.” At ThreatQuotient, we’re celebrating with a month-long recognition of women in cybersecurity.
As a woman in security, it’s hard not to notice the gender imbalance.
In recent years threat hunting has become much more widely adopted, but today the definition of threat hunting is still quite a controversial topic.
When an entire company decides to collectively embrace telework at the same time, over an extended period of time, the result is that business processes must change.
The SANS 2021 Cyber Threat Intelligence (CTI) Survey is now available and, not surprising given the events of last year, the theme of “resilience” comes through loud and clear.
The ThreatQ Platform can help bridge the threat hunting skills gap. It provides a single, collaborative environment that can include threat hunters, incident handlers and threat intelligence and SOC analysts.
The usefulness of the MITRE ATT&CK framework depends on whether it is implemented effectively and whether security managers have the ability to aggregate and analyze the data in a simple way.
At ThreatQuotient, we believe you cannot defend against what you do not understand, so threat intelligence is critical to ensure a SOAR platform is using the right data to execute the right actions.
The mapping of the MITRE framework data, summarized as threat information, is ultimately one of the main activities that an IT security department will undertake.
Adoption of threat hunting has jumped from 75% of organizations in 2018 to 85% of organizations in 2020.
When news of a widespread compromise breaks, the ThreatQ Platform helps understand and focus on what’s relevant to your organization, and operationalize that intelligence quickly to strengthen security posture.
When building a threat intelligence library, it is important to determine a methodology that covers all aspects of intelligence, ensuring what is created can be effectively used operationally, tactically, and strategically.
Threat intelligence has become the lifeblood of security operations. As new use cases emerge, it has become integral to leveraging teams, tools and processes more efficiently and effectively.
The ThreatQ platform takes a threat-centric approach to security operations because we believe you cannot defend against what you do not understand.