Category: ThreatQuotient
Do Your Part to Stay Safe Online and Start Using a Password Manager
Do Your Part to Stay Safe Online and Start Using a Password Manager Aaron Louks Cybersecurity Awareness Month 2020 is about taking proactive steps to enhance cybersecurity at home and in the workplace. One of the best ways you can do this is byIs Scaling a Pyramid on Your Bucket List? It Should Be
The concept of “The Pyramid of Pain” was first introduced by David J. Bianco in 2013. Today, most security professionals are familiar with it as a construct for describing the usefulness and relative ease of acquiring threat data andThreatQuotient Listed in Gartner’s 2020 Market Guide for Security Orchestration, Automation and Response Solutions
ThreatQ platform’s data-driven approach to SOAR can free-up two to three full-time security analysts for higher level tasks Reston Va. – Oct. 7, 2020 – ThreatQuotient, a leading security operations platform innovator, today5 Tips You Can Start Using Today to Reduce Business Risk
5 Tips You Can Start Using Today to Reduce Business Risk POSTED BY ANDY GEPERT Cyber threat intelligence (CTI), risk management and privacy teams tend to work as siloed operations. But how can they come together – fusing processes andThreatQuotient Celebrates World Rhino Day 2020 With Ongoing Support for Helping Rhinos
Cybersecurity startup’s rhino conservation efforts have expanded to include three additional rhino adoptions and a Black Mamba sponsorship Reston, Va. – Sept. 21, 2020 – ThreatQuotient, a leading security operationsThe Crucial Component of Detection and Response: Intelligence Pivoting
Intelligence Pivoting Allows You to Build a Broader Picture and is Pivotal to Detection and Response Pivot. It’s a word we’re hearing more frequently since the pandemic and I find it interesting for its dual meaning. One on the oneCTI Recommendations from a Panel of Experts
CTI Recommendations from a Panel of Experts POSTED BY ANDY GEPERT In the last few years, Cyber Threat Intelligence (CTI) has matured into a standalone program with its own staff, tools and processes. New feeds, internal teams and solutions haveAre You Maximizing MITRE ATT&CK? Insights from the new SANS Whitepaper Will Help
Are You Maximizing MITRE ATT&CK? Insights from the new SANS Whitepaper Will Help POSTED BY LIZ BUSH The MITRE ATT&CK framework has become a game-changing tool for security teams to assess their organization’s security posturePutting the Pieces Together for Extended Detection and Response
Pulling the Right Data From the Right Tools Allows You to Validate a Detection and Respond Effectively The Data Breach Investigations Report (DBIR) from Verizon has evolved significantly since it was first published. But one thing thatSpike in Cloud Attacks Shows Businesses were not Prepared to Work from Home
Spike in Cloud Attacks Shows Businesses were not Prepared to Work from Home POSTED BY RYAN TROST Businesses continue to place more and more data in the cloud, from personal details to intellectual property. The growing adoption of cloud-basedLoad More