Category: ThreatQuotient
Women in Cybersecurity – Amy Donovan
Women in Cybersecurity PROFILE – AMY DONOVAN Amy Donovan ThreatQuotient Business Development Manager What do you do at ThreatQuotient? Help build our Partner Ecosystem. Constantly on the search for strategic partnerships that canOfficial agenda of RISK conference 2020 now live!
With our premier annual conference, RISK 2020, set to take place less than one month from now, we are announcing the official event agenda, which will deliver 2 knowledgeful days of technology, fun and spectacle to over 600 IT professionals fromSOAR vs. Security Operations: What’s Really Going On?
SOAR vs. Security Operations: What’s Really Going On? POSTED BY JOHN CZUPAK There’s something big brewing in the world of security operations, but what exactly is it? We are regularly inundated with various descriptions of usefulThreatQ Webinar: Leveraging Threat Intelligence for effective Vulnerability Management
November 14, 2019 at 10AM GMT Vulnerability management is a challenge for many organizations. If not done efficiently and effectively, it can lead to data breach. However, it is simply impossible to patch and mitigate every softwareIn the Detection and Response Era, a Unified SOC is the Path to Success
This may be cheesy, and half of you reading this may not have been alive at the time to remember, but President Ronald Reagan’s appeal more than 30 years ago to “tear down this wall” is advice security professionals should heed as well. APut Together a Winning Game Plan Against Adversaries with MITRE ATT&CK
Put Together a Winning Game Plan Against Adversaries with MITRE ATT&CK POSTED BY CYRILLE BADEAU We recently held a seminar demonstrating how the MITRE ATT&CK framework can be leveraged across an entire cybersecurity practice.Making Use of Cyber Attribution Reports
Making Use of Cyber Attribution Reports POSTED BY ROSS HAMMER Having recently read the Office of Director of National Intelligence’s (ODNI’s) “A Guide to Cyber Attribution,” I began to think of ways ThreatQ can help analysts useLeveraging CTI to benefit organisations’ security posture
Leveraging CTI to benefit organisations’ security posture POSTED BY ANTHONY PERRIDGE One out of five companies are unsure of the value cyber threat intelligence can bring to their organisation. Over the last year, we have seen theInvestigation and Response is a Team Sport
I’ve talked before about how we have the tools and technologies to make the intelligent SOCa reality. It’s a welcomed development given the global cybersecurity skills shortage of three million and growing. Security operations centers (SOCs) areWelcome to the Age of the Investigations Platform
Remember when we used to believe we could prevent every attack? We focused on prevention, layering defenses so that if one layer failed another would be there to stop the attack. As the years passed, we realized that despite a defense-in-depthLoad More