Tag "Threat Intelligence"

Back to homepage
Vendor News

ThreatQuotient Named Industry’s Top Threat Intelligence Platform by Frost & Sullivan

Research report honours ThreatQ with 2019 Technology Innovation Award for delivering a streamlined, efficient platform London, UK – 12th November 2019 – ThreatQuotient™, a leading security operations platform innovator, today

IT Compliance

To Improve Incident Response, You Need to Consider 3rd Party Solutions

Organizations reported an average 32% reduction in threat responder workload when they deployed a managed SIEM solution, according to CenturyLink and IDG. Click here to view original webpage at www.helpnetsecurity.com

IT Compliance

Cyber Security Nordic: Have data? Use it, delete it

Toxic data in the industry parlance usually means non-consented information obtained from users, which poses the chance of penalties under data protection regulations. However, data hoarded without any immediate use

Hardware/Network

Avoid Bad Security Buying Decisions

Remaining competitive means staying abreast of—and even ahead of—the latest technologies that empower business. As the network expands and creates new and greater vulnerabilities, organizations know they need to enhance

Hardware/Network

EFFECTIVE CYBERSECURITY CAN HELP IN ACCELERATING BUSINESS TRANSFORMATION

Across the digitally inter-connected world, we are globally witnessing a rapid change in technology resulting in a tectonic shift in the way man and machine interact with one another. Along

Expert Articles Software

SOAR vs. Security Operations: What’s Really Going On?

By John Czupak – CEO at ThreatQuotient, There’s something big brewing in the world of security operations, but what exactly is it? We are regularly inundated with various descriptions of

Software

Automation, visibility remain biggest issues for cybersecurity teams

Organizations still do not have necessary levels of automation or visibility within their cyber terrain, especially as security stacks grow and are underutilized, Fidelis Cybersecurity’s annual State of Threat Detection

Artificial Intelligence

How AI Is Improving Threat Protection

Successful cybersecurity attacks can be so severe that they shut down business operations, erode the public’s trust in an organization and require substantial financial resources to go toward recovering. So,

Software

How effective is your security operations center?

While the SOC is considered an essential or important component of business, most security professionals rate their SOC’s effectiveness as low, and 49 percent say it is not fully aligned with business

Expert Articles Network Security

Your IT is too Slow for Faster New Phishing Scams

By Atif Mushtaq – CEO at SlashNext, Successful phishing attacks depend on a quick response from users – and it’s working all too well. While many employees have some form