Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

ThreatQuotient

Importance of great communication

In all relationships, issues can arise. The key to solving those issues is to have a clear understanding of the issue itself. For instance, when a customer reports an issue it is critical to listen to the customer with patience and empathy so that they feel understood, and to assure them that they will receive assistance promptly. Furthermore, product issues can present themselves in various forms of complexities.

Hangin' with Haig: Conversations Beyond the Keyboard

ThreatQuotient's Director of Alliances, Haig Colter, assumes the role of host in our series Hangin’ with Haig: Conversations Beyond the Keyboard. In our upcoming episode, we welcome Valéry Marchive. Co-founder of LeMagIT, Valéry has been its editor-in-chief since January 2020. A computer scientist by training, he specialised in cybersecurity and has developed an investigative approach to his journalistic practice, both in studying known cyberattacks and in understanding the dynamics of cybercrime. For several years, he has meticulously investigated cyber attacks with ransomware and their perpetrators.

Dialing-up Data to Tackle Expanding Security Challenges

Many security professionals feel like broken records at this point when we say, “the threat landscape is constantly evolving”, and especially when we talk about how security operations centers (SOCs) are always trying to do more with less. But over the last couple of years, what we think of as standard security issues have evolved into several new, daunting challenges.

There's a New and Potentially More Dangerous Arrow in Cupid's Quiver

It’s Valentine’s Day and love is in the air. Flowers, candy, cards and dinner are some of the classic ways we show our love on this day. But as an increasing number of people look for love online, it’s a good time for a reminder that more people lose more money in online romance scams than in any other fraud category. According to the FBI, over the past five years $1.3 billion in losses have been reported, with annual losses skyrocketing since the pandemic.

ISO 27001 welcomes Threat Intelligence

In my previous article I defined what is Cyber Threat Intelligence (CTI), described how to measure it and explained why it is important to implement a CTI program that can serve different stakeholders with different types of intelligence requirements in order to have a proactive security approach. 2022 was a productive year for ISO (International Organization for Standardization) security standards.

Automating SOC Operations: Tips for Embarking on an XDR Journey

Cybersecurity automation is a hot topic as organizations wrestle with the challenges of increasing attack volumes, cybersecurity skill shortages, and how to make the best use of limited resources to protect the enterprise. However, when it comes to implementing automation with a target of achieving extended detection and response (XDR), it can be hard to know where to start and how to build a case for investment.

Effectively meeting and exceeding the requirements of the SAMA Cyber Threat Intelligence Principles

Responsible for supervising nearly $1Trillion of assets across 30 banks and financial institutions, SAMA plays a crucial role in ensuring economic and financial stability within the Kingdom of Saudi Arabia. The SAMA Cyber Security Framework and Threat Intelligence Principles are mandatory regulations for all member organisations regulated by the Saudi Arabian Monetary Authority (SAMA) operating within the Kingdom of Saudi Arabia.