The Integration Imperative for XDR MARC SOLOMON In my previous blog, I talked about the need for a conduit between Extended Detection and Response (XDR) solutions and the data sources and security tools these solutions need to interoperate with.
I’m guessing the creators of the movie The Princess Bride had no idea that Inigo Montoya’s quote – You keep using that word. I do not think it means what you think it means. – would be widely quoted for
From the Trenches, Part 2: Working with Employees to Strengthen Security Posture Liz Bush During COVID-19 and the shift to a remote work environment, employees play an even greater role in helping to protect organizations against cyberattacks.
Do Your Part to Stay Safe Online and Start Using a Password Manager Aaron Louks Cybersecurity Awareness Month 2020 is about taking proactive steps to enhance cybersecurity at home and in the workplace. One of the best ways you can do this is by
The concept of “The Pyramid of Pain” was first introduced by David J. Bianco in 2013. Today, most security professionals are familiar with it as a construct for describing the usefulness and relative ease of acquiring threat data and
ThreatQ platform’s data-driven approach to SOAR can free-up two to three full-time security analysts for higher level tasks Reston Va. – Oct. 7, 2020 – ThreatQuotient, a leading security operations platform innovator, today
5 Tips You Can Start Using Today to Reduce Business Risk POSTED BY ANDY GEPERT Cyber threat intelligence (CTI), risk management and privacy teams tend to work as siloed operations. But how can they come together – fusing processes and
Cybersecurity startup’s rhino conservation efforts have expanded to include three additional rhino adoptions and a Black Mamba sponsorship Reston, Va. – Sept. 21, 2020 – ThreatQuotient, a leading security operations
Intelligence Pivoting Allows You to Build a Broader Picture and is Pivotal to Detection and Response Pivot. It’s a word we’re hearing more frequently since the pandemic and I find it interesting for its dual meaning. One on the one
CTI Recommendations from a Panel of Experts POSTED BY ANDY GEPERT In the last few years, Cyber Threat Intelligence (CTI) has matured into a standalone program with its own staff, tools and processes. New feeds, internal teams and solutions have