Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest posts

Go Beyond Core AIOps Use Cases with Robotic Data Automation (RDA) and AIOps Studio

Implementing any IT project requires time, planning, and effort and AIOps probably requires even more planning and stakeholder involvement, because of the breadth of coverage and potential to bring profits to multiple IT domains/functions (ex: ITOps/ITSM/NOCOps). Customers have high expectations from AIOps, but, even after taking such major projects, most AIOps vendors are only able to support a few core AIOps use cases, which severely limits the utility and potential of AIOps.

SANS 2020 Cyber Threat Intelligence Survey Report:

Cyber Threat Intelligence (CTI) is analyzed information about the capabilities, opportunities and intent of adversaries that meets a specific requirement determined by a stakeholder. Organizations with CTI programs focus on understanding the threats they face and providing specific information to help defend against those threats. Key survey takeaways: Copyright © 2019, ThreatQuotient, Inc. All Rights Reserved.

7 Key Elements to Building a Compliance Program

As cybercriminals continue to evolve their threat methodologies, industry standards and governments have revised their compliance programs and audit criteria. Regulators and auditors have increasingly begun requiring organizations to mature their programs in order to ensure continuous monitoring as well as senior management and board-level oversight.

Snyk & Intuit roundtable: Breaking silos, engaging with security and developer communities

I recently attended a Snyk roundtable with Intuit, and it was such a good session that I wanted to write a post sharing some of the insightful discussion and takeaways — starting with this great artistic impression of the session! As a TL;DR, here are my biggest takeaways from the session.