Category: Press releases
Unlock the Power of Security Automation: 3 Use Cases to Consider
Unlock the Power of Security Automation: 3 Use Cases to Consider Leon Ward At ThreatQuotient, we write a lot about security automation. Most recently, we’ve discussed how our data-driven approach […]As the Cyber Threat Environment Escalates, How are Organizations Responding?
As the Cyber Threat Environment Escalates, How are Organizations Responding? Cyrille Badeau Globally, the cyber threat level to organizations remains high and the current situation only serves to highlight this […]Breaking Barriers at Black Hat 2022 with Women in Cybersecurity
Breaking Barriers at Black Hat 2022 with Women in Cybersecurity Kasey Ello Women in Cybersecurity Happy Hour at Black Hat 2022 After more than two years of having our days […]Cover these five topics before going forward with an M&A
The S&P Global 451 Research Tech M&A Outlook Survey found that the value of technology deals announced in 2021 exceeded $1 trillion for the first time in history – and […]Looking for Some Summer Reading? Check Out Our Top Blogs so Far this Year
Looking for Some Summer Reading? Check Out Our Top Blogs so Far this Year Kasey Ello Summertime often means vacation time and a chance to rest, relax and catch up […]Security Automation, Lessons Learned from Top Gun: Maverick
Security Automation, Lessons Learned from Top Gun: Maverick Marc Solomon The cybersecurity industry has talked about security automation for years. We’ve grappled with what, when and how to automate. We’ve […]The Meaning of Orchestration
The Meaning of Orchestration Vicki Lemay Recently, ThreatQuotient hosted an interactive discussion regarding security orchestration and cyber security automation adoption – what it is, what it’s meant to do, and […]The Current State of Intelligent Automation Adoption in Cybersecurity
The Current State of Intelligent Automation Adoption in Cybersecurity Cyrille Badeau In the past year, research indicates that nearly a third of organizations have accelerated their plans to automate key […]Reduce Time Or Do Not, There Is No Shift
Reduce Time Or Do Not, There Is No Shift Dave Krasik In previous blog posts we’ve discussed the value of a data-driven approach to security operations. In this post, we’d […]Taking a Data-Driven Approach to SOC Operations
Taking a Data-Driven Approach to SOC Operations LEON WARD Today’s escalating threat landscape means that security operations teams face a multitude of challenges. This can make it challenging for them […]Load More