Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Featured Post

Keeping the Lights on: Cybersecurity Automation in Critical National Infrastructure

Ask anyone who was scheduled to fly in or out of London Heathrow airport in the UK on March 20 and 21 2025, and they'll tell you that disruption to critical national infrastructure (CNI) is no joke. A fire at a local electricity substation resulted in thousands of journey disruptions and cancellations as one of the world's busiest airports was closed and incoming planes were diverted to alternative locations. The knock-on effect of the closure continued for days, and lost tourism revenue for the UK.

Washington Post Recognizes ThreatQuotient with the Greater Washington Area Top Workplaces 2025 Award

ThreatQuotient has been awarded a Top Workplaces 2025 honor by Washington Top Workplaces. This nomination is based solely on employee feedback gathered through a third-party survey administered by employee engagement technology partner Energage LLC.

ThreatQuotient to join Securonix

Today is a big day for the Crash. We are announcing the next step in our collective journey – Securonix has acquired ThreatQuotient. This is an exciting and rare opportunity to combine Securonix’s best-in-class security analytics and detection with ThreatQ’s best-in-class threat intelligence platform. As we all know, the security operations world is changing at a dramatic pace.

How to Keep Major Worldwide Sporting Events on Secure Ground Using Threat Intelligence Reporting

As we look at the sporting calendar for 2025 with the UEFA Women’s European Championship in Switzerland and the Tour de France in July, as well as the 2025 Women's Rugby World Cup in the UK starting in August, armchair sportspeople and in-person spectators are spoilt for choice. But aside from the marvel of watching athletes compete to achieve their dreams, the organization (and security) of such events requires meticulous planning, particularly as dates are fixed and immovable.

Webinar Takeaways: Automate the Threat Intelligence Lifecycle to Strengthen Defenses

Threat analysts are being bombarded with hundreds, if not thousands, of threat intel data points including new indicators of compromise (IoCs), evolving threat actor groups, shifts in regions and industries being targeted and new tools, techniques and procedures (TTPs). Security operations must be data driven so you can understand threats and efficiently allocate resources to address your most important requirements.