Taking a data-driven approach to SOC operations
SOC teams are under pressure to detect security events and rapidly respond, and this is hard to do when they are drowning in data.
Comcast to use ThreatQuotient for cybersecurity operations
Comcast, the parent company of NBC Universal and SKY Group, has chosen ThreatQ Platform and ThreatQ Investigations to meet their cybersecurity needs.
The increasing importance of cyber threat intelligence
Globally, the cyber threat level to organisations remains high, and the current situation only serves to highlight this further.
3 signs your company could do more to promote women in cybersecurity
The business case for diversity is stronger than ever: companies that are more diverse outperform their less diverse peers financially.
ThreatQuotient celebrates multiple industry award wins
ThreatQuotient has won multiple awards across a range of categories ahead of releasing the latest version of its ThreatQ Platform.
Five pointers for choosing a Threat Intelligence Platform
As the new financial year looms, companies are starting to identify the key strategic focus areas for the year ahead and the technology investments needed to deliver them.
Cybersecurity automation: differing priorities show need for better C-Suite awareness of benefits
You don’t have to look far in the media to find experts predicting that 2022 will be the year of automation.
The state of the SOC: skills shortages, automation and gaining context remain a challenge for SOCs
The security operations centre (SOC) has been on the front line facing the pandemic-induced escalation of cybersecurity threats in the past eighteen months.
Maximising your investments through security automation
Let’s face it, we’ve talked about security automation for years. We’ve grappled with what, when and how to automate. At certain points we’ve wondered if there’s any place at all for automation. But in our heart of hearts, we’ve known for years that automation is the future. Now the future is here.
The threat model as a compass
Just like a compass, regularly reviewing the threat model keeps the CTI teams IR’s pointed in the right direction over time.
Security professionals cautiously optimistic about automation benefits
Despite high levels of automation within cybersecurity across a range of different verticals, almost half lack trust in the outcomes that automation can provide.
Anatomy of a supply chain attack: how to accelerate incident response and threat hunting
Supply chain attacks show no sign of slowing down. But the right combination of platforms can help organisations get ahead of the threat.
What makes a security analyst successful? Investigative thinking
Empowering humans to engage in critical thinking is vital to efficient detection and response, writes ThreatQuotient APJC regional director Anthony Stitt.
Frost & Sullivan
Frost & Sullivan awards ThreatQuotient for XDR leadership
The 2021 Best Practices Competitive Strategy Leadership Award for XDR recognises strong performance across seven categories.
Leveraging a new MSSP/MDR SOC contract to build an intelligence practice
Few organisations have matured their security operations (SecOps) to the point where they have integrated a complete CTI practice.
Are you prepared for the surge in ransomware?
Many organisations have been left behind with their security operations.
Companies must be on the same page to achieve strategic & tactical CTI management
An effective CTI program requires the alignment of people, processes and technology, writes ThreatQuotient APJC regional director Anthony Stitt.
Five best practices to improve threat report action & analysis
While many organisations use a TIP to make data actionable for detection and protection, far fewer use a TIP for forensics.
Proactively mitigate cyber risk with MISP and TheHive
When an attack happens, security teams should be ready with information about who is attacking and the steps being taken to mitigate damage.
Defence engineering and threat intel — no stone left unturned
Understanding the limitations of defences requires examining how blocking and detection systems leverage cyber threat intelligence.
ThreatQuotient launches automation capability for detection and response
"The focus of ThreatQ TDR Orchestrator is data, not process. In detection and response, what is learned when performing an action is far more important than the action itself."
Automotive Security Research Group selects ThreatQuotient
ThreatQuotient is throwing its weight behind the development of automotive cybersecurity, specifically threat intelligence sharing for automotive products.
ThreatQuotient hits $22.5m in new financing, continues growth streak
“Since we first invested in ThreatQuotient in 2017, their team has continued to prove to the market that there is a critical need for cybersecurity solutions aimed at security operations."
Pandemic sees organisations of all sizes and industries invest in CTI
There is opportunity for organisations to better manage their cyber-threat intelligence for greater security and threat intelligence effectiveness by adopting the right tools and processes.