Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest Publications

7 Key Elements to Building a Compliance Program

As cybercriminals continue to evolve their threat methodologies, industry standards and governments have revised their compliance programs and audit criteria. Regulators and auditors have increasingly begun requiring organizations to mature their programs in order to ensure continuous monitoring as well as senior management and board-level oversight.

SANS 2020 Cyber Threat Intelligence Survey Report:

Cyber Threat Intelligence (CTI) is analyzed information about the capabilities, opportunities and intent of adversaries that meets a specific requirement determined by a stakeholder. Organizations with CTI programs focus on understanding the threats they face and providing specific information to help defend against those threats. Key survey takeaways: Copyright © 2019, ThreatQuotient, Inc. All Rights Reserved.

The Ultimate Guide To OWASP Security Checks for Web and Mobile Apps

When you are looking for genuine, inexpensive unbiased information to make your application secure, there is no better source to go to than OWASP. OWASP gives you guidelines to the industry's top threats and security best practices that help ensure your applications are secured. Take a look at this FREE OWASP Guide that covers vulnerabilities from both web and mobile to give you a comprehensive overview of your application's security status.

Data Breaches in the Healthcare Industry

As per data published by the Office of the Australian Information Commissioner, the healthcare industry in Australia accounted for 22% of notifiable data breaches between January to June 2020, which was more than any other industry. Cybercriminals continue to target this industry due to the vast amounts of highly sensitive personal information (such as Medicare numbers, credit card information and medical insurance numbers) that is stored by healthcare providers.