ThreatQuotient, Inc.

threatq.com

ThreatQuotient™ understands that the foundation of intelligence-driven security is people. The company’s open and extensible threat intelligence platform, ThreatQ, provides defenders with the context, customization and collaboration needed to ensure that intelligence is accurate, relevant and timely to their business. Leading global companies are using ThreatQ as the cornerstone of their threat operations and management system, increasing security effectiveness and efficiency.

C-Suite On Deck

Responsive image

Feature market insights and perspectives from top C-Level executives, elite technology influencers and thought leaders from your company here. This signature initiative has garnered immense support...

Contact Us

Events

Related News

Data Security,Platform Security,Software Security

LEGIT SECURITY DISCOVERS NEW CLASS OF DEVELOPMENT PIPELINE VULNERABILITIES; OPEN-SOURCE RUST PROGRAMMING LANGUAGE FOUND VULNERABLE

Legit Security | December 12, 2022

news image

Legit Security, a cyber security company with an enterprise platform that protects an organization's software supply chain from attack and ensures secure application delivery, today announced that it discovered a new class of software supply chain vulnerabilities that leverage artifact poisoning to attack underlying software development pipelines. The vulnerability was found in GitHub Actions, a platform for orchestrating and automating software development pipelines, and the vulnerability w...

Read More

DATA BREACH REPORT: POPULAR DIGITAL WALLET APP KEY RING EXPOSES 14 MILLION USERS

securitymagazine | April 03, 2020

news image

Led by Noam Rotem and Ran Locar, vpnMentor’s research team of ethical hackers, recently discovered a data leak by the popular app Key Ring, that compromised the privacy and security of their 14 million users. Key Ring allows users to upload scans and photos of membership and loyalty cards onto a digital folder on one’s phone. However, many users also use it to store copies of IDs, driver licenses, credit cards, and more. A misconfigured Amazon Web Services (AWS) S3 bucket owned by th...

Read More

Data Security,Platform Security,Software Security

APPLICATION & CLOUD SECURITY LEADER CHOOSES DTEX INTERCEPT TO MANAGE INSIDER RISK AND PREVENT DATA LOSS

DTEX Systems | December 21, 2022

news image

DTEX Systems, the Workforce Cyber Intelligence & Security Company™, today announced that one of the world’s leading application performance and cloud security vendors has selected DTEX InTERCEPT to secure patents, protect business process innovation, and prevent data loss. DTEX InTERCEPT™ is a first-of-its-kind Workforce Cyber Security solution that brings together the capabilities of Insider Threat Management, User and Entity Behavior Analytics, Digital Fore...

Read More

Data Security,Platform Security,Software Security

BALBIX ANNOUNCES CYBERSECURITY POSTURE AUTOMATION FOR MICROSOFT AZURE

Balbix | December 19, 2022

news image

Balbix, the leader in cybersecurity posture automation, announced its support for Microsoft Azure today. With these new capabilities, Balbix now supports the three top cloud service providers – Microsoft Azure, Amazon Web Services and Google Cloud Platform – as well as traditional environments. Balbix also announced enhanced platform support for the Microsoft ecosystem, including Azure services, Windows, Microsoft Store apps and Azure Active Directory single sign-on. M...

Read More
news image

Data Security,Platform Security,Software Security

LEGIT SECURITY DISCOVERS NEW CLASS OF DEVELOPMENT PIPELINE VULNERABILITIES; OPEN-SOURCE RUST PROGRAMMING LANGUAGE FOUND VULNERABLE

Legit Security | December 12, 2022

Legit Security, a cyber security company with an enterprise platform that protects an organization's software supply chain from attack and ensures secure application delivery, today announced that it discovered a new class of software supply chain vulnerabilities that leverage artifact poisoning to attack underlying software development pipelines. The vulnerability was found in GitHub Actions, a platform for orchestrating and automating software development pipelines, and the vulnerability w...

Read More
news image

DATA BREACH REPORT: POPULAR DIGITAL WALLET APP KEY RING EXPOSES 14 MILLION USERS

securitymagazine | April 03, 2020

Led by Noam Rotem and Ran Locar, vpnMentor’s research team of ethical hackers, recently discovered a data leak by the popular app Key Ring, that compromised the privacy and security of their 14 million users. Key Ring allows users to upload scans and photos of membership and loyalty cards onto a digital folder on one’s phone. However, many users also use it to store copies of IDs, driver licenses, credit cards, and more. A misconfigured Amazon Web Services (AWS) S3 bucket owned by th...

Read More
news image

Data Security,Platform Security,Software Security

APPLICATION & CLOUD SECURITY LEADER CHOOSES DTEX INTERCEPT TO MANAGE INSIDER RISK AND PREVENT DATA LOSS

DTEX Systems | December 21, 2022

DTEX Systems, the Workforce Cyber Intelligence & Security Company™, today announced that one of the world’s leading application performance and cloud security vendors has selected DTEX InTERCEPT to secure patents, protect business process innovation, and prevent data loss. DTEX InTERCEPT™ is a first-of-its-kind Workforce Cyber Security solution that brings together the capabilities of Insider Threat Management, User and Entity Behavior Analytics, Digital Fore...

Read More
news image

Data Security,Platform Security,Software Security

BALBIX ANNOUNCES CYBERSECURITY POSTURE AUTOMATION FOR MICROSOFT AZURE

Balbix | December 19, 2022

Balbix, the leader in cybersecurity posture automation, announced its support for Microsoft Azure today. With these new capabilities, Balbix now supports the three top cloud service providers – Microsoft Azure, Amazon Web Services and Google Cloud Platform – as well as traditional environments. Balbix also announced enhanced platform support for the Microsoft ecosystem, including Azure services, Windows, Microsoft Store apps and Azure Active Directory single sign-on. M...

Read More

Resources

resource image

Enterprise Security, Platform Security, Software Security

FortiClient Data Sheet

Whitepaper

resource image

InfoSec Project Management

Protecting The Aviation Sector From Cyberattacks

Whitepaper

resource image

Enterprise Security, Platform Security, Software Security

FortiClient Data Sheet

Whitepaper

resource image

InfoSec Project Management

Protecting The Aviation Sector From Cyberattacks

Whitepaper

Events

C-Suite On Deck

Responsive image

Feature market insights and perspectives from top C-Level executives, elite technology influencers and thought leaders from your company here. This signature initiative has garnered immense support...

Contact Us