Category: ThreatQuotient
Security Automation, Lessons Learned from Top Gun: Maverick
Security Automation, Lessons Learned from Top Gun: Maverick Marc Solomon The cybersecurity industry has talked about security automation for years. We’ve grappled with what, when and how to automate. We’ve […]The Pendulum Effect and Security Automation
The last few years have been filled with examples of the “Pendulum Effect”, where trends swing from one extreme to another before settling at an equilibrium, somewhere in the middle. […]The Meaning of Orchestration
The Meaning of Orchestration Vicki Lemay Recently, ThreatQuotient hosted an interactive discussion regarding security orchestration and cyber security automation adoption – what it is, what it’s meant to do, and […]The Current State of Intelligent Automation Adoption in Cybersecurity
The Current State of Intelligent Automation Adoption in Cybersecurity Cyrille Badeau In the past year, research indicates that nearly a third of organizations have accelerated their plans to automate key […]Security Orchestration: Beware of the Hidden Financial Costs
Among the many improvements in cybersecurity technology and tools we’ve seen over the last few years, one of the most significant has been the inclusion of security automation and orchestration […]ThreatQuotient Recognized as a 2022 Top Place to Work by The Washington Post
Provider of security operations solutions stands out for excellent workplace culture that has contributed to industry recognition for the companyReston, Va. – June 17, 2022 – ThreatQuotient™, a leading security […]Reduce Time Or Do Not, There Is No Shift
Reduce Time Or Do Not, There Is No Shift Dave Krasik In previous blog posts we’ve discussed the value of a data-driven approach to security operations. In this post, we’d […]Automation. Where do We Go from Here?
What’s next in the evolution of security automation and orchestration? Over the past 20 years we’ve seen significant improvements in cybersecurity technology and tools. For example, new versions of intrusion […]Taking a Data-Driven Approach to SOC Operations
Taking a Data-Driven Approach to SOC Operations LEON WARD Today’s escalating threat landscape means that security operations teams face a multitude of challenges. This can make it challenging for them […]Taking a Data-Driven Approach to SOC Operations
Taking a Data-Driven Approach to SOC Operations LEON WARD Today’s escalating threat landscape means that security operations teams face a multitude of challenges. This can make it challenging for them […]Load More