Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

ThreatQuotient

Looking under the hood at ROI calculations for Security Automation

Threat actors continue to work faster and show greater sophistication in their tactics, techniques, and procedures (TTPs). Meanwhile, organizations struggle to keep pace because they are strapped by the persistent shortage of skilled cybersecurity professionals which, exacerbated by the pandemic, grew by 26.2% over the past year.

Thinking of a SecOps Platform? Showing ROI Just Got Easier

As threats have continued to evolve, enterprises have made significant investments in security infrastructure and security operations is maturing. C-Suites and Boards are increasingly involved in security decision making and studies show that they are doubling down on security investments, which are expected to grow from $262.4 billion in 2021 to $458.9 billion in 2025.

How Sysdig is Using the ThreatQ Platform to Enhance Cloud Threat Detection and Response

It is always interesting to learn about real-world examples of technologies at work. So, when ThreatQuotient invited me to share how we at Sysdig are using the ThreatQ Platform to enhance our cloud detection and response solutions, I was happy to participate.

Budget and momentum are key to cybersecurity automation maturity - and CISOs are feeling left behind

As cyber threats intensify and the human and financial resources available to deal with them remain limited, there is a growing need for automation in cybersecurity. The intelligent automation of key cybersecurity processes can significantly improve an organization’s posture and at the same time support under-pressure employees by reducing reliance on manual processes.

Budget and momentum are key to cybersecurity automation maturity - and CISOs are feeling left behind

As cyber threats intensify and the human and financial resources available to deal with them remain limited, there is a growing need for automation in cybersecurity. The intelligent automation of key cybersecurity processes can significantly improve an organization’s posture and at the same time support under-pressure employees by reducing reliance on manual processes.

ThreatQuotient Publishes 2022 State of Cybersecurity Automation Adoption Research Report

Survey results highlight which automation use cases are working, which need more focus, and how senior cybersecurity professionals are approaching the challenge of securing the extended enterprise.

TIPs to Measure your CTI Program

Nowadays, organizations are exposed to a high volume of security related information. Unfortunately, most of these organizations have little to no capabilities of using this information in a proactive manner, i.e. using information to try to change or anticipate an outcome. In other words, using information to produce intelligence products. It is safe to say that few of these organizations have a clear understanding of what Cyber Threat Intelligence (CTI) is and what it is not.

Wrapping up CSAM 2022 with Vulnerability Management Advice for Everyone

As we wrap up Cybersecurity Awareness Month (CSAM) 2022, the final topic we’ll cover is updating software and patching vulnerabilities. According to the 2022 Data Breach Investigations Report (DBIR) from Verizon one of the top paths threat actors use to infiltrate organizations is exploiting vulnerabilities. And there appears to be no end in sight as the number of unique security vulnerabilities rose almost 10% in 2021, up to 20,142 from 18,351 in 2020.

Phishing Scams Have Reached New Heights: How to Improve Detection and Response

The Anti-Phishing Working Group (APWG) Phishing Activity Trends Report reveals that in Q2 of 2022 there were 1,097,811 total phishing attacks. This marks the worst quarter for phishing observed to date, exceeding Q1 of 2022 which was the first time the three-month total exceeded one million.