Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Threat Intelligence

Elevating What a TIP Can Be - The ThreatQ Platform

In a previous blog I reviewed the foundational use case for a TIP, which is threat intelligence management—the practice of aggregating, analyzing, enriching and de-duplicating internal and external threat data in order to understand threats to your environment and share that data with a range of systems and users. However, one of the unique benefits of the ThreatQ Platform and where organizations are deriving additional business value, is that it also allows you to address other use cases.

Cybersecurity Breakthrough Awards Names ThreatQuotient Security Automation Solution of the Year

With thousands of tools and technologies to choose from, navigating through cybersecurity categories and technologies to find a solution that meets your organization’s needs can be challenging. The annual Cybersecurity Breakthrough Awards program helps you solve that problem by aiming to perform the most comprehensive evaluation of cybersecurity companies and solutions on the market today and recognizing the leaders.

The Ultimate Guide to Cyber Threat Intelligence

A successful breach can do serious damage to a business, costing a company millions of dollars in lost revenue, exposed intellectual property, downtime, reputation loss and fines. The right practices can help keep a company safe — but only if they know what threats to look for, and where their network is weakest. Cyber threat intelligence is the process through which companies identify weaknesses in their own networks.

5 Best Practices to Get More from Threat Intelligence

As we wrap up Cybersecurity Awareness Month 2021, this week’s theme, Cybersecurity First, is all about making security a priority. To do this, many security operations teams are leaning into threat intelligence to understand specifically where and how to focus their efforts to better protect their organizations.

Curate and Share Threat Intelligence to Accelerate Security Operations

Over the last several months we’ve seen a tremendous uptick in cyberattacks. Nearly every day, news of another ransomware, supply chain or zero-day attack makes headline news. So, what can organizations do to mitigate risk? One major step forward to improve security operations is to effectively share curated threat intelligence.

2020 Was the Year of the Phish. Let's Make Sure 2021 Isn't a Sequel

2020 was the year of the phish. Well, not officially. According to the Chinese Zodiac, 2020 was the Year of the Rat. But if you look at it from a cyberattack trends perspective, plenty of third parties reported a huge uptick in phishing attacks during 2020. The SANS 2021 Top New Attacks and Threat Report points to both the Microsoft Digital Defense Report 2020 and the 2021 Data Breach Investigations Report as key sources that validate phishing as the most common initial compromise vector.

Cybersecurity Awareness Month Isn't Just for Techies: Tips for Everyone

This month marks the 18th year of Cybersecurity Awareness Month (CSAM) which focuses on helping provide individuals with resources they need to stay safer and more secure online. Now, more than ever, the overarching theme “Do Your Part. #BeCyberSmart” should resonate with everyone.