Press releases|Vendors

ThreatQ Academy Drives User Success and Immediate ROI for Clients and Partners

ThreatQ Academy Drives User Success and Immediate ROI for Clients and Partners Charlie Hanner The tech sector, in general, is often far too focused on speeds and feeds to the detriment of the end goal, driving overall customer success. And the cybersecurity industry is no exception. Vendors tout a laundry list of features and functions

ThreatQ Academy Drives User Success and Immediate ROI for Clients and Partners Read More »

From Threat Intelligence to Data-Driven Use Cases, the Evolution of Security Automation

From Threat Intelligence to Data-Driven Use Cases, the Evolution of Security Automation Julia Weifenbach Dave Krasik, Director of Product Management at ThreatQuotient, recently had a chance to speak with Ed Amoroso, CEO and founder of TAG Cyber, a leading cybersecurity advisory group, about the state of cybersecurity automation. They covered a lot of ground, and

From Threat Intelligence to Data-Driven Use Cases, the Evolution of Security Automation Read More »

How ThreatQ Embodies RSAC 2023 Theme: Stronger Together

How ThreatQ Embodies RSAC 2023 Theme: Stronger Together Leon Ward RSAConference 2023 USA hit the nail on the head with this year’s theme: Stronger Together. From the U.S. federal government’s prioritization to promote threat intelligence sharing, to the geopolitical environment and joining of allies to combat cyberwarfare, and the cybersecurity industry’s buzz around frameworks and

How ThreatQ Embodies RSAC 2023 Theme: Stronger Together Read More »

Cyber-Physical Systems Attacks and Saving Rhinos: The Ultimate Comic Book

Cyber-Physical Systems Attacks and Saving Rhinos: The Ultimate Comic Book Noor Boulos Over the years, cybersecurity has been the subject of blockbuster movies, page-turning novels, shocking memoirs and mind-boggling documentaries. And it remains a fascinating subject no matter how you look at it. Fact or fiction. Good guys or bad guys. Industry or government. There’s

Cyber-Physical Systems Attacks and Saving Rhinos: The Ultimate Comic Book Read More »

Women in Cybersecurity – Celine Gajnik-Kinnoo

Women in Cybersecurity   Celine Gajnik-KinnooThreatQuotient – Global Marketing Director Where do you work?ThreatQuotient How long have you worked here?I have been at ThreatQuotient for more than 6 years. What do you enjoy most about your job and company?Working with different teams across the globe, which help me to learn different markets and needs as

Women in Cybersecurity – Celine Gajnik-Kinnoo Read More »

There’s a New and Potentially More Dangerous Arrow in Cupid’s Quiver

There’s a New and Potentially More Dangerous Arrow in Cupid’s Quiver Julia Weifenbach It’s Valentine’s Day and love is in the air. Flowers, candy, cards and dinner are some of the classic ways we show our love on this day. But as an increasing number of people look for love online, it’s a good time

There’s a New and Potentially More Dangerous Arrow in Cupid’s Quiver Read More »

ISO 27001 welcomes Threat Intelligence

ISO 27001 welcomes Threat Intelligence Ramiro Céspedes Introduction In my previous article I defined what is Cyber Threat Intelligence (CTI), described how to measure it and explained why it is important to implement a CTI program that can serve different stakeholders with different types of intelligence requirements in order to have a proactive security approach.

ISO 27001 welcomes Threat Intelligence Read More »

Effectively meeting and exceeding the requirements of the SAMA Cyber Threat Intelligence Principles

Effectively meeting and exceeding the requirements of the SAMA Cyber Threat Intelligence Principles Munaf Kazi Responsible for supervising nearly $1Trillion of assets across 30 banks and financial institutions, SAMA plays a crucial role in ensuring economic and financial stability within the Kingdom of Saudi Arabia. The SAMA Cyber Security Framework and Threat Intelligence Principles are mandatory regulations

Effectively meeting and exceeding the requirements of the SAMA Cyber Threat Intelligence Principles Read More »