Category: ThreatQuotient
ThreatQuotient Publishes Research Report: State of Cyber Security Automation Adoption in 2021
Report highlights trends and challenges of automating IT security systems and how CISOs and senior security professionals are planning to accelerate the adoption of automation Reston, Va. – Sept. 29, […]ThreatQuotient Continues Tradition of Celebrating World Rhino Day in 2021
Rhino conservation efforts remain an important mission for the Reston, Va. based cybersecurity company Reston, Va. – Sept. 22, 2021 – ThreatQuotient™, a leading security operations platform innovator, today invites […]How Threat Response is Evolving
As adversaries changed their view of an attack to include vectors across an organization, defenders have had to evolve their approach as well. This is best captured by Mark Harris […]Leveraging MISP and TheHive When You Create Your CTI Practice
Leveraging MISP and TheHive When You Create Your CTI Practice CYRILLE BADEAU Many CISOs I speak with across Europe tell me their cybersecurity teams rely on two, primary open-source platforms […]Learn Why Frost & Sullivan Names ThreatQuotient the XDR Competitive Strategy Leader
Learn Why Frost & Sullivan Names ThreatQuotient the XDR Competitive Strategy Leader MARC SOLOMON Extended Detection and Response (XDR) is the latest buzz word in the security industry and garnering […]How Threat Detection is Evolving
As adversaries have shifted the focus of attacks to achieve their goals, defenders must evolve their approach to threat detection The threat landscape is dynamic and ever changing. Adversaries are […]Defence Engineering and Threat Intel – No Stone Left Unturned
Defence Engineering and Threat Intel – No Stone Left Unturned ANTHONY STITT Every breach starts as a compromise that goes unnoticed and unactioned, often because existing security devices have too […]Are You Prepared to Better Protect Against SANS’ Top Attacks and Threats?
Are You Prepared to Better Protect Against SANS’ Top Attacks and Threats? ANDY GEPERT The SANS 2021 Top New Attacks and Threat Report is now available for download, covering the […]Security is a Big Data Problem, and It’s Getting Bigger
Solving security’s big data problem is about prioritized data flow, continuously processing data for analysis and translating and exporting it to create a single security infrastructure Typically, when someone says […]How to Assess and Up-level Your Organization’s Maturity for SOAR, Gartner’s Take
How to Assess and Up-level Your Organization’s Maturity for SOAR, Gartner’s Take MARC SOLOMON Earlier this year, Gartner published its latest research on the Security Orchestration, Automation and Response (SOAR) […]Load More