Women in Cybersecurity – Terri Mullings
Women in Cybersecurity PROFILE - TERRI MULLINGS Terri Mullings Controller – ThreatQuotient How long have you worked there?Over 8 years What aspects of your job bring you the most satisfaction?My...
View ArticleBlog I Understand how Cyber Threat Intelligence can best leverage the...
Understand how Cyber Threat Intelligence can best leverage the capabilities of network detection and response Julia Weifenbach Intelligence is now considered essential to the process of identifying,...
View ArticleWomen in Cybersecurity – Helen Hopper
Women in Cybersecurity PROFILE - HELEN HOPPER Helen Hopper Associate Copywriting Manager – C8 Consulting – the disruptive tech PR agency How long have you worked there?Six years What aspects of your...
View ArticleWomen in Cybersecurity – Shira Beck
Women in Cybersecurity PROFILE - SHIRA BECK Shira Beck UX Designer – ThreatQuotient How long have you worked there?2 1/2 Years What aspects of your job bring you the most satisfaction?I find...
View ArticleWomen in Cybersecurity – Audrey Amédro
Women in Cybersecurity PROFILE - AUDREY AMEDRO Audrey Amédro Founder and CEO – Sesame-IT How long have you worked there? I have worked at Sesame it for 7 years; a company I have founded in 2017. We...
View ArticleBlog I Five ways your business can bridge the cybersecurity skills gaps to...
Five ways your business can bridge the cybersecurity skills gaps to find and keep top talent Leon Ward We hear a lot about the cybersecurity skills gap, which the latest research puts at 3.4 million...
View ArticleWomen in Cybersecurity – Jen VanAntwerp
Women in Cybersecurity PROFILE - JEN VANANTWERP Jen VanAntwerp Founder – Sober in Cyber Owner – JVAN Consulting How long have you worked there?We began building the Sober in Cyber community in early...
View ArticleWomen in Cybersecurity – Lydia Grilheres
Women in Cybersecurity PROFILE - LYDIA GRILHERES Lydia Grilheres Responsable Marketing Operationnel – Thales How long have you worked there?I have been working for Thales for eight years, within...
View ArticleBlog I The CISO’s Next Priority Isn’t Technology
The CISO's Next Priority Isn't Technology - It's Building a Great Employee Experience Leon Ward In security, we are very used to talking about features and functions in the tools we use. When it comes...
View ArticleLeveraging Threat Intelligence for Regulatory Compliance
Leveraging Threat Intelligence for Regulatory Compliance Cyrille Badeau The US Government recently announced that state-sponsored Chinese cyber group Volt Typhoon has compromised multiple critical...
View ArticleBlog I Enhancing Cyber Resilience: Safeguarding the Electricity Grid
Enhancing Cyber Resilience: Safeguarding the Electricity Grid Celine Gajnik Digital transformation powers critical infrastructure, the protection of systems is paramount. ThreatQuotient has announced...
View ArticleBlog I Breaking the cybersecurity automation logjam won’t break the bank
Breaking the cybersecurity automation logjam won’t break the bank Leon Ward Right now, to boost efficiency and achieve economies of scale, businesses want to automate as much as possible. In back...
View ArticleBlog I Simplifying Security Workflows with ThreatQuotient Automation
Simplifying Security Workflows with ThreatQuotient Automation Ed Young It’s not just about speeding up processes; it’s about efficiency, accuracy, and ultimately, staying one step ahead of threats. At...
View ArticleBlog I Unlocking the Art of Possible: Exploring the ThreatQ Community
Unlocking the Art of Possible: Exploring the ThreatQ Community Julia Weifenbach In cybersecurity, staying ahead of threats requires not only cutting-edge technology but also a collaborative community...
View ArticleBlog I Selecting the Optimal Threat Intelligence Platform in 5 Steps
Selecting the Optimal Threat Intelligence Platform in 5 Steps Noor Boulos To use threat intelligence and data more productively, many organizations are investing in a threat intelligence platform...
View ArticleBlog I Accelerating Cybersecurity in the Transportation Industry
Accelerating Cybersecurity in the Transportation Industry Julia Weifenbach The transportation industry is not only part of critical infrastructure, but at the nexus of other critical infrastructure...
View ArticleBlog I Building for Cyber Resilience in the Manufacturing Industry
Building for Cyber Resilience in the Manufacturing Industry Noor Boulos For the third year in a row, manufacturing was the most attacked industry according to IBM X-Force incident response data....
View ArticleBlog I Powering visibility, intelligence processing and delivery of quality...
Powering visibility, intelligence processing and delivery of quality information for SOC teams Julien Rodrigues Roque Today’s cyber threats continue to evolve at pace as adversaries compress the time...
View ArticleBlog I How threat intelligence can improve vulnerability management outcomes
How threat intelligence can improve vulnerability management outcomes Chris Jacob It might surprise you to know that more than 70 new vulnerabilities are published every day. And despite their...
View ArticleBlog I Protecting Healthcare Against Cyber Threats
Protecting Healthcare Against Cyber Threats Céline Gajnik Healthcare organizations stand as prime targets for cybercriminals, drawn by the allure of valuable personal and health information stored...
View Article