ComputerWeekly.com Research Library

Powered by Bitpipe.com

All Research Sponsored By:ThreatQuotient

  • How to Collect and Use Internal Threat Intelligence

    From the boardroom to the SOC, executives and analysts alike can benefit from a threat intelligence platform as the foundation to threat-centric security operations.In this video demo, learn how to quickly understand threats, make better decisions and accelerate detection and response using ThreatQ.

  • Spear-phishing Analysis with ThreatQ Investigations

    Spear-phishing attacks are a growing security threat to organizations and their employees. These attacks target victims from a seemingly reliable source to lure them to a malware-ridden site. View this webinar to learn how to develop your spear-phishing investigation skills to spot an and attack before it becomes troublesome.

  • Making MITRE ATT&CK Actionable

    In this webinar, join technical experts at ThreatQuotient as they outline merging MITRE ATT&CK with SIEM visibility and threat intelligence in the ThreatQ platform to unify threat detection efforts. Interested in seeing how this platform works? Watch the webinar to learn more.

  • Leveraging Threat Intelligence for Efficient Threat Hunting

    In this webinar, ThreatQuotient displays how threat intelligence can be used to help make the threat hunting process more efficient and prioritize threat hunting activities.

  • Emerging Technology Analysis: SOAR Solutions

    Although SOAR and SIEM share similar security capabilities, they are distinct markets unlikely to consolidate. However, technology leaders at SOAR providers need to understand this distinction in order to build upon existing SIEM services. This deep dive from Gartner focuses on SOAR and offers recommendations for SOAR providers.

  • ThreatQ for Government Agencies

    As government agencies are considered critical infrastructure, they are under constant attack from hackers, political activists and foreign state-sponsored actors. The first step to detecting, responding and recovering from incidents is finding a way to increase situation awareness. Download this brief to learn more.

  • Accelerating Detection and Response with ThreatQ

    In this case study, uncover how a US-based financial services organization partnered with ThreatQuotient to streamline their existing resources and accelerate threat detection and response to act in a matter of hours or days.

  • ThreatQ for Critical Infrastructure

    Critical infrastructure attacks can have long-term impacts on vital industries like power, healthcare, defense, food production and more. In this edition of ThreatQuotient’s Industry Brief, take an in-depth look into the challenges and key statistics surrounding critical infrastructure security.

  • Buyer’s Guide to Threat Intelligence Platforms

    As organizations begin to build their threat intelligence operations, they must consider how they will organize their data. Threat intelligence platforms (TIPs) give IT teams the visibility required to make the most of existing resources. Read this white paper to learn more about TIP, and how to go about making an informed buying decision.

  • ThreatQ for Healthcare

    The personal health information that healthcare providers process and store make them enticing targets for hackers. The average cost of a data breach over the past 2 years is $2.2 million, and the number of attacks is increasing rapidly. Read this white paper to uncover key cybersecurity insights for the healthcare industry.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2020 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.