Category: ThreatQuotient
The Threat Model as a Compass
The Threat Model as a Compass ANTHONY STITT The purpose of the Cyber Threat Intelligence (CTI) team is to understand the cyber threat environment and communicate intelligence so that the […]What Does Sun Tzu Have to Do with XDR? More Than You Might Think!
What Does Sun Tzu Have to Do with XDR? More Than You Might Think! ANTHONY PERRIDGE Military general and philosopher Sun Tzu once led the largest armies in the world […]Integration of the ThreatQ platform into McAfee Enterprise infrastructure
Integration of the ThreatQ platform into McAfee Enterprise infrastructure EUTIMIO FERNANDEZ Proper management of threat data is critical in today’s security operations and modern SOCs. The knowledge of threats, their […]Acronyms Aside, the SOC of the Future Needs These 3 Capabilities
Every discipline has its acronyms, but I’d venture to say cybersecurity has more than its share. We use them to describe threat actors and how they operate, as well as […]ThreatQuotient dévoile ThreatQ v5 : pour soutenir le SOC du futur avec des capacités clés de gestion des données
L’approche axée sur les données, l’architecture d’open intégration et l’automatisation équilibrée de ThreatQ permettent aux équipes de travailler plus rapidement et deCybersecurity Breakthrough Awards Names ThreatQuotient Security Automation Solution of the Year
Cybersecurity Breakthrough Awards Names ThreatQuotient Security Automation Solution of the Year MARC SOLOMON With thousands of tools and technologies to choose from, navigating through cybersecurity categories and technologies to find […]3 Questions for MDRs Helping to Get Your Enterprise to XDR
An XDR implementation can quickly turn into a very large consulting project requiring significant time and budget As cybersecurity professionals we’re accustomed to change. We know that as soon as […]Interested in a Career in Cybersecurity? These Tips Can Help Guide Your Journey
Interested in a Career in Cybersecurity? These Tips Can Help Guide Your Journey KASEY ELLO With the current global cybersecurity talent shortage just over three million, and the cybersecurity job […]Curate and Share Threat Intelligence to Accelerate Security Operations
Curate and Share Threat Intelligence to Accelerate Security Operations MIKE SOLOMON AND ROSS HAMMER Over the last several months we’ve seen a tremendous uptick in cyberattacks. Nearly every day, news […]How Integration is Evolving: The X Factor in XDR
XDR must be approached as an open architecture where integration is the linchpin Over the past couple of months, I’ve talked about how adversaries are evolving their approaches to attacks […]Load More