Articles, News and Industry Tips

Read the latest articles on best practices, building customer-centric products, and the latest in cybersecurity.
Filters
Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.
Vulnerability Management
Open Source Security
Open Vulnerability Assessment Language (OVAL) in a Nutshell - Part 2

August 27, 2022

Vulnerability Management
Threat Intelligence
Ransomware
Detecting Atlassian Confluence Exploitation - CVE-2022-26134

July 22, 2022

Threat Integrations
Cisco Umbrella Reporting Integration with Cortex XSOAR

March 31, 2022

Vulnerability Management
Compliance & Risk Management
Open Vulnerability Assessment Language (OVAL) in a Nutshell

January 7, 2022

Threat Integrations
Palo Alto Networks Cortex XSOAR Integration

September 9, 2021

Threat Integrations
Is it time for leading Threat Intelligence Platforms to support custom objects such as Wallet IDs, Cryptocurrency address for Cryptocurrency Threat Intelligence providers?

August 23, 2021

Threat Intelligence
Vulnerability Management
Emerging Threats and Vulnerabilities in Cybersecurity

June 3, 2021

Threat Integrations
Fast Incident Response (FIR) Integration with Threat Intelligence Management Platform (IMP)

March 26, 2021

Threat Integrations
How can you speed up Incident Response on ServiceNow for Automated Enrichment of security incidents using Threat Intelligence ?

February 19, 2021

Threat Integrations
IBM QRadar Use Cases

February 5, 2021

Threat Integrations
Is Microsoft Azure Sentinel your next Implementation? Learn how Loginsoft integrated Sentinel with data source

September 9, 2020

Threat Integrations
Loginsoft builds expertise in integrating Threat Intelligence source with ThreatQuotient's Threat Intelligence Platform

August 13, 2020

Sign up to our Newsletter