Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

ThreatQuotient

Dialing-up Data to Tackle Expanding Security Challenges

Many security professionals feel like broken records at this point when we say, “the threat landscape is constantly evolving”, and especially when we talk about how security operations centers (SOCs) are always trying to do more with less. But over the last couple of years, what we think of as standard security issues have evolved into several new, daunting challenges.

There's a New and Potentially More Dangerous Arrow in Cupid's Quiver

It’s Valentine’s Day and love is in the air. Flowers, candy, cards and dinner are some of the classic ways we show our love on this day. But as an increasing number of people look for love online, it’s a good time for a reminder that more people lose more money in online romance scams than in any other fraud category. According to the FBI, over the past five years $1.3 billion in losses have been reported, with annual losses skyrocketing since the pandemic.

ISO 27001 welcomes Threat Intelligence

In my previous article I defined what is Cyber Threat Intelligence (CTI), described how to measure it and explained why it is important to implement a CTI program that can serve different stakeholders with different types of intelligence requirements in order to have a proactive security approach. 2022 was a productive year for ISO (International Organization for Standardization) security standards.

Automating SOC Operations: Tips for Embarking on an XDR Journey

Cybersecurity automation is a hot topic as organizations wrestle with the challenges of increasing attack volumes, cybersecurity skill shortages, and how to make the best use of limited resources to protect the enterprise. However, when it comes to implementing automation with a target of achieving extended detection and response (XDR), it can be hard to know where to start and how to build a case for investment.

Effectively meeting and exceeding the requirements of the SAMA Cyber Threat Intelligence Principles

Responsible for supervising nearly $1Trillion of assets across 30 banks and financial institutions, SAMA plays a crucial role in ensuring economic and financial stability within the Kingdom of Saudi Arabia. The SAMA Cyber Security Framework and Threat Intelligence Principles are mandatory regulations for all member organisations regulated by the Saudi Arabian Monetary Authority (SAMA) operating within the Kingdom of Saudi Arabia.

SANS CyberThreat: An Inside Track on Europe's Premier Cyber Security Conference

In January the eyes of the global cyber security community will turn to London as the CyberThreat conference gets under way. First launched in 2018, the event is a highlight in the cybersecurity calendar and a must-attend for cyber security intelligence professionals. Nowhere else can attendees get such a breadth and depth of insight and experience on the cyber security trends sweeping the world - whether that's from the teams at NCSC, ENISA, the Bank of England or one of the many individual security experts gracing the agenda.

Defender to Defender: Voice of the Customer Webinar with Sysdig

As more companies move their operations from on-prem to the cloud, they are turning to Sysdig which provides tools to secure containers, Kubernetes, and cloud services. The Sysdig Threat Research Team, which now numbers close to 20 threat research engineers, includes computer security and machine learning experts from around the world.

Is Cybersecurity Automation on Your List of New Year's Resolutions? 6 Tips to Help

Every year, millions of people make New Year’s resolutions, both personally and professionally, and we all know how difficult resolutions can be to keep. One of the top workplace resolutions cybersecurity professionals are making this year is to pursue security automation initiatives.