Quantcast
Channel: ThreatQuotient - Blog Archives
Browsing all 38 articles
Browse latest View live

Image may be NSFW.
Clik here to view.

Women in Cybersecurity – Terri Mullings

Women in Cybersecurity PROFILE - TERRI MULLINGS   Terri Mullings Controller – ThreatQuotient How long have you worked there?Over 8 years What aspects of your job bring you the most satisfaction?My...

View Article


Blog I Understand how Cyber Threat Intelligence can best leverage the...

Understand how Cyber Threat Intelligence can best leverage the capabilities of network detection and response Julia Weifenbach Intelligence is now considered essential to the process of identifying,...

View Article

Image may be NSFW.
Clik here to view.

Women in Cybersecurity – Helen Hopper

Women in Cybersecurity PROFILE - HELEN HOPPER   Helen Hopper Associate Copywriting Manager – C8 Consulting – the disruptive tech PR agency How long have you worked there?Six years What aspects of your...

View Article

Image may be NSFW.
Clik here to view.

Women in Cybersecurity – Shira Beck

Women in Cybersecurity PROFILE - SHIRA BECK   Shira Beck UX Designer – ThreatQuotient How long have you worked there?2 1/2 Years What aspects of your job bring you the most satisfaction?I find...

View Article

Image may be NSFW.
Clik here to view.

Women in Cybersecurity – Audrey Amédro

Women in Cybersecurity PROFILE - AUDREY AMEDRO   Audrey Amédro Founder and CEO – Sesame-IT How long have you worked there? I have worked at Sesame it for 7 years; a company I have founded in 2017. We...

View Article


Blog I Five ways your business can bridge the cybersecurity skills gaps to...

Five ways your business can bridge the cybersecurity skills gaps to find and keep top talent Leon Ward We hear a lot about the cybersecurity skills gap, which the latest research puts at 3.4 million...

View Article

Image may be NSFW.
Clik here to view.

Women in Cybersecurity – Jen VanAntwerp

Women in Cybersecurity PROFILE - JEN VANANTWERP   Jen VanAntwerp Founder – Sober in Cyber Owner – JVAN Consulting How long have you worked there?We began building the Sober in Cyber community in early...

View Article

Image may be NSFW.
Clik here to view.

Women in Cybersecurity – Lydia Grilheres

Women in Cybersecurity PROFILE - LYDIA GRILHERES   Lydia Grilheres Responsable Marketing Operationnel – Thales How long have you worked there?I have been working for Thales for eight years, within...

View Article


Blog I The CISO’s Next Priority Isn’t Technology

The CISO's Next Priority Isn't Technology - It's Building a Great Employee Experience Leon Ward In security, we are very used to talking about features and functions in the tools we use. When it comes...

View Article


Leveraging Threat Intelligence for Regulatory Compliance

Leveraging Threat Intelligence for Regulatory Compliance Cyrille Badeau The US Government recently announced that state-sponsored Chinese cyber group Volt Typhoon has compromised multiple critical...

View Article

Blog I Enhancing Cyber Resilience: Safeguarding the Electricity Grid

Enhancing Cyber Resilience: Safeguarding the Electricity Grid Celine Gajnik Digital transformation powers critical infrastructure, the protection of systems is paramount. ThreatQuotient has announced...

View Article

Blog I Breaking the cybersecurity automation logjam won’t break the bank

Breaking the cybersecurity automation logjam won’t break the bank Leon Ward Right now, to boost efficiency and achieve economies of scale, businesses want to automate as much as possible. In back...

View Article

Image may be NSFW.
Clik here to view.

Blog I Simplifying Security Workflows with ThreatQuotient Automation

Simplifying Security Workflows with ThreatQuotient Automation Ed Young It’s not just about speeding up processes; it’s about efficiency, accuracy, and ultimately, staying one step ahead of threats. At...

View Article


Blog I Unlocking the Art of Possible: Exploring the ThreatQ Community

Unlocking the Art of Possible: Exploring the ThreatQ Community Julia Weifenbach In cybersecurity, staying ahead of threats requires not only cutting-edge technology but also a collaborative community...

View Article

Blog I Selecting the Optimal Threat Intelligence Platform in 5 Steps

Selecting the Optimal Threat Intelligence Platform in 5 Steps Noor Boulos  To use threat intelligence and data more productively, many organizations are investing in a threat intelligence platform...

View Article


Blog I Accelerating Cybersecurity in the Transportation Industry

Accelerating Cybersecurity in the Transportation Industry Julia Weifenbach The transportation industry is not only part of critical infrastructure, but at the nexus of other critical infrastructure...

View Article

Blog I Building for Cyber Resilience in the Manufacturing Industry

Building for Cyber Resilience in the Manufacturing Industry Noor Boulos For the third year in a row, manufacturing was the most attacked industry according to IBM X-Force incident response data....

View Article


Blog I Powering visibility, intelligence processing and delivery of quality...

Powering visibility, intelligence processing and delivery of quality information for SOC teams Julien Rodrigues Roque Today’s cyber threats continue to evolve at pace as adversaries compress the time...

View Article

Blog I How threat intelligence can improve vulnerability management outcomes

How threat intelligence can improve vulnerability management outcomes Chris Jacob It might surprise you to know that more than 70 new vulnerabilities are published every day. And despite their...

View Article

Blog I Protecting Healthcare Against Cyber Threats

Protecting Healthcare Against Cyber Threats Céline Gajnik Healthcare organizations stand as prime targets for cybercriminals, drawn by the allure of valuable personal and health information stored...

View Article
Browsing all 38 articles
Browse latest View live