Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

ThreatQuotient to join Securonix

Today is a big day for the Crash. We are announcing the next step in our collective journey – Securonix has acquired ThreatQuotient. This is an exciting and rare opportunity to combine Securonix’s best-in-class security analytics and detection with ThreatQ’s best-in-class threat intelligence platform. As we all know, the security operations world is changing at a dramatic pace.

How to Keep Major Worldwide Sporting Events on Secure Ground Using Threat Intelligence Reporting

As we look at the sporting calendar for 2025 with the UEFA Women’s European Championship in Switzerland and the Tour de France in July, as well as the 2025 Women's Rugby World Cup in the UK starting in August, armchair sportspeople and in-person spectators are spoilt for choice. But aside from the marvel of watching athletes compete to achieve their dreams, the organization (and security) of such events requires meticulous planning, particularly as dates are fixed and immovable.

Webinar Takeaways: Automate the Threat Intelligence Lifecycle to Strengthen Defenses

Threat analysts are being bombarded with hundreds, if not thousands, of threat intel data points including new indicators of compromise (IoCs), evolving threat actor groups, shifts in regions and industries being targeted and new tools, techniques and procedures (TTPs). Security operations must be data driven so you can understand threats and efficiently allocate resources to address your most important requirements.
Featured Post

The Value of Threat Intelligence in Ensuring DORA Compliance

"Expect the unexpected" is a saying that holds particular weight in cybersecurity. In 2025, with continuing technological advancement, the divide between game-changing business opportunities and serious cyber threats has never been starker. With innovation and disruption unlikely to slow the pace any time soon, all sectors must build their operational resiliency to stay ahead and ensure stability.

Takeaway from RSAC 2025: Focus on AI Utility

If you are at all involved in cybersecurity, then chances are you attended or talked to someone about the RSA Conference 2025. This year’s theme was “Many Voices, One Community” – a spot on description based on my experience. Yes, there were many voices – mostly talking AI, specifically agentic AI which is driving innovation and demand for security solutions.
Featured Post

Improving Cyber and Mental Resilience with Threat Information Sharing

In a world where data provides companies with a competitive advantage, sharing it amongst other businesses, especially in the same industry, may seem counterproductive. However, in cybersecurity, where every company is a potential target for threat actors and organizations are increasingly interconnected through supply chains, sharing information can significantly enhance a company's security posture and overall resilience.

The Value of Threat Intelligence in Ensuring DORA Compliance

“Expect the unexpected” is a saying that holds particular weight in cybersecurity. In 2025, with continuing technological advancement, the divide between game-changing business opportunities and serious cyber threats has never been starker. With innovation and disruption unlikely to slow the pace any time soon, all sectors must build their operational resiliency to stay ahead and ensure stability.

People, Process, Technology: How Cybersecurity Automation Fuels the Virtuous Circle

Cybersecurity isn’t just about tools and firewalls — it’s about people. Cybersecurity automation is proving to be a game-changer, not only for security outcomes but also for the people behind them. For many organizations, automation is now tightly aligned with employee satisfaction and retention. In fact, 47% of organizations see workforce morale as a key performance indicator (KPI) when evaluating the return on investment (ROI) of their cybersecurity automation efforts.
Featured Post

How to keep major worldwide sporting events on secure ground using threat intelligence reporting

As we look at the sporting calendar for 2025 with the UEFA Women's European Championship in Switzerland and the Tour de France in July, as well as the 2025 Women's Rugby World Cup in the UK starting in August, armchair sportspeople and in-person spectators are spoilt for choice. But aside from the marvel of watching athletes compete to achieve their dreams, the organization (and security) of such events requires meticulous planning, particularly as dates are fixed and immovable. To put this into context, the Olympic Games are one of the most widely covered sporting events in the world, with an audience of more than 4 billion viewers.

Enhancing Threat Intelligence and Threat Detection in Australian Central Government Organisations

In an era where digital frontiers are continuously expanding and evolving, adaptability is critical for Federal, State, and Local Government Departments, and Agencies to secure their infrastructure and sensitive data. Progress and growth strategies must be aligned with defense against growing cyber threats. Cyber threat intelligence (CTI) and threat detection have emerged as essential strategies for proactively identifying and mitigating cyber risks.