Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Blog

Enhancing Cyber Resilience: Safeguarding the Electricity Grid

Digital transformation powers critical infrastructure, the protection of systems is paramount. ThreatQuotient has announced its participation in the vendor affiliate program of the Electricity Information Sharing and Analysis Center (E-ISAC). This collaboration marks a significant step forward in fortifying North America’s electricity grid against cyber threats.

Tutorial: Learn the Basics of Active Directory

Active Directory (AD) is the cornerstone of any on-premises or hybrid Microsoft environment. It stores information about users, computers and other objects, and provides vital services that enable employees to be productive and business processes to run. This article covers the Active Directory basics you need to know.

Cybersecurity Challenges in European Telehealth

Telehealth or telemedicine is one of the most common ways of providing healthcare services in the EU, with nearly 77% of countries adopting some type of telehealth service. Countries like Norway, Sweden, Denmark, and Italy are considered some of the world’s leaders in providing telehealth services. Following the COVID-19 pandemic, telehealth became widely adopted across Europe, with many countries participating in cross-border collaboration.

Guide to Group Policy Management in Active Directory

Group Policy is a feature of Microsoft Windows operating systems that helps administrators manage and secure users and computers in Active Directory environments. Group Policy settings are grouped into Group Policy objects (GPOs) and applied to computer and user objects within the scope of the GPO. For example, Group Policy objects can be used to manage: This guide explains the key elements of Group Policy management.

Law Enforcement Must Keep up the Pressure on Cybergangs

The (apparent) takedown of major ransomware players like Blackcat/ALPHV and LockBit and the threat groups’ (apparent) revival is a prime example of the Whack-a-Mole nature of combating ransomware gangs that often takes place. However, this level of difficulty doesn’t mean the pressure should be relieved.

From Risk to Fix in a Single Click: How CultureAI Are Redefining Nudges in Cyber Security

The term 'nudge' has become a buzzword in cyber security over recent years, often being mistakenly equated with 'notifications'. CultureAI aims to shift this perception by leveraging Nudge Theory principles to implement actionable Nudges.

From Water to Wine: An Analysis of WINELOADER

In late February 2024, Mandiant identified APT29, a Russian state-sponsored threat group, deploying a new backdoor called WINELOADER to target German political parties. This campaign marks a significant shift in APT29's targeting, as they have traditionally focused on government and diplomatic entities. The expansion to political parties suggests an evolution in the group's intelligence gathering priorities, likely influenced by the current geopolitical climate.

The NFL's George Griesler on securing the Super Bowl and reducing risk through collaboration

In this week’s episode of The Future of Security Operations podcast, I'm joined by George Griesler. George has been working in cybersecurity since 1997, when he assumed the role of Senior Network administrator at the United States Golf Association (USGA), eventually advancing to Director of Information Security.

13 Best DDoS Protection Software in the Market 2024

With DDoS attacks on the rise—surpassing 4.25 billion in 2023—the right protection is crucial. Costly downtime—$6,130/minute—underscores the urgency. These attacks are getting more sophisticated, especially those that target the application layer. They’re hard to spot because they look like normal traffic and can seriously mess up a company’s operations and finances.