All resources sponsored by:

ThreatQuotient

10 Matches
How to Collect and Use Internal Threat Intelligence
sponsored by ThreatQuotient
VIDEO:From the boardroom to the SOC, executives and analysts alike can benefit from a threat intelligence platform as the foundation to threat-centric security operations.In this video demo, learn how to quickly understand threats, make better decisions and accelerate detection and response using ThreatQ.
Posted: 24 Jan 2020 | Premiered: 24 Jan 2020
Get This Now


Spear-phishing Analysis with ThreatQ Investigations
sponsored by ThreatQuotient
WEBCAST:Spear-phishing attacks are a growing security threat to organizations and their employees. These attacks target victims from a seemingly reliable source to lure them to a malware-ridden site. View this webinar to learn how to develop your spear-phishing investigation skills to spot an and attack before it becomes troublesome.
Posted: 23 Jan 2020 | Premiered: Jan 23, 2020
Get This Now


Making MITRE ATT&CK Actionable
sponsored by ThreatQuotient
WEBCAST:In this webinar, join technical experts at ThreatQuotient as they outline merging MITRE ATT&CK with SIEM visibility and threat intelligence in the ThreatQ platform to unify threat detection efforts. Interested in seeing how this platform works? Watch the webinar to learn more.
Posted: 23 Jan 2020 | Premiered: Jan 23, 2020
Get This Now


Leveraging Threat Intelligence for Efficient Threat Hunting
sponsored by ThreatQuotient
WEBCAST:In this webinar, ThreatQuotient displays how threat intelligence can be used to help make the threat hunting process more efficient and prioritize threat hunting activities.
Posted: 22 Jan 2020 | Premiered: Jan 22, 2020
Get This Now


Emerging Technology Analysis: SOAR Solutions
sponsored by ThreatQuotient
WHITE PAPER:Although SOAR and SIEM share similar security capabilities, they are distinct markets unlikely to consolidate. However, technology leaders at SOAR providers need to understand this distinction in order to build upon existing SIEM services. This deep dive from Gartner focuses on SOAR and offers recommendations for SOAR providers.
Posted: 22 Jan 2020 | Published: 07 Dec 2018
Get This Now


ThreatQ for Government Agencies
sponsored by ThreatQuotient
DATA SHEET:As government agencies are considered critical infrastructure, they are under constant attack from hackers, political activists and foreign state-sponsored actors. The first step to detecting, responding and recovering from incidents is finding a way to increase situation awareness. Download this brief to learn more.
Posted: 21 Jan 2020 | Published: 21 Jan 2020
Get This Now


Accelerating Detection and Response with ThreatQ
sponsored by ThreatQuotient
CASE STUDY:In this case study, uncover how a US-based financial services organization partnered with ThreatQuotient to streamline their existing resources and accelerate threat detection and response to act in a matter of hours or days.
Posted: 21 Jan 2020 | Published: 21 Jan 2020
Get This Now


ThreatQ for Critical Infrastructure
sponsored by ThreatQuotient
RESOURCE:Critical infrastructure attacks can have long-term impacts on vital industries like power, healthcare, defense, food production and more. In this edition of ThreatQuotient’s Industry Brief, take an in-depth look into the challenges and key statistics surrounding critical infrastructure security.
Posted: 20 Jan 2020 | Published: 20 Jan 2020
Get This Now


Buyer’s Guide to Threat Intelligence Platforms
sponsored by ThreatQuotient
WHITE PAPER:As organizations begin to build their threat intelligence operations, they must consider how they will organize their data. Threat intelligence platforms (TIPs) give IT teams the visibility required to make the most of existing resources. Read this white paper to learn more about TIP, and how to go about making an informed buying decision.
Posted: 20 Jan 2020 | Published: 31 Mar 2018
Get This Now


ThreatQ for Healthcare
sponsored by ThreatQuotient
DATA SHEET:The personal health information that healthcare providers process and store make them enticing targets for hackers. The average cost of a data breach over the past 2 years is $2.2 million, and the number of attacks is increasing rapidly. Read this white paper to uncover key cybersecurity insights for the healthcare industry.
Posted: 17 Jan 2020 | Published: 17 Jan 2020
Get This Now


10 Matches
Page: 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2020, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info