Women in Cybersecurity PROFILE – AMY DONOVAN Amy Donovan ThreatQuotient Business Development Manager What do you do at ThreatQuotient? Help build our Partner Ecosystem. Constantly on the search for strategic partnerships that can
With our premier annual conference, RISK 2020, set to take place less than one month from now, we are announcing the official event agenda, which will deliver 2 knowledgeful days of technology, fun and spectacle to over 600 IT professionals from
SOAR vs. Security Operations: What’s Really Going On?
POSTED BY JOHN CZUPAK
There’s something big brewing in the world of security operations, but what exactly is it? We are regularly inundated with various descriptions of useful
November 14, 2019 at 10AM GMT Vulnerability management is a challenge for many organizations. If not done efficiently and effectively, it can lead to data breach. However, it is simply impossible to patch and mitigate every software
This may be cheesy, and half of you reading this may not have been alive at the time to remember, but President Ronald Reagan’s appeal more than 30 years ago to “tear down this wall” is advice security professionals should heed as well. A
Put Together a Winning Game Plan Against Adversaries with MITRE ATT&CK
POSTED BY CYRILLE BADEAU
We recently held a seminar demonstrating how the MITRE ATT&CK framework can be leveraged across an entire cybersecurity practice.
Making Use of Cyber Attribution Reports
POSTED BY ROSS HAMMER
Having recently read the Office of Director of National Intelligence’s (ODNI’s) “A Guide to Cyber Attribution,” I began to think of ways ThreatQ can help analysts use
Leveraging CTI to benefit organisations’ security posture
POSTED BY ANTHONY PERRIDGE
One out of five companies are unsure of the value cyber threat intelligence can bring to their organisation.
Over the last year, we have seen the
I’ve talked before about how we have the tools and technologies to make the intelligent SOCa reality. It’s a welcomed development given the global cybersecurity skills shortage of three million and growing. Security operations centers (SOCs) are
Remember when we used to believe we could prevent every attack? We focused on prevention, layering defenses so that if one layer failed another would be there to stop the attack. As the years passed, we realized that despite a defense-in-depth