Cyentia Cybersecurity Research Library
  • Sources
  • Tags
  • About
  • Sponsors
  • More from Cyentia

ThreatQuotient

Below you will find reports with the source of “ThreatQuotient”

image from 2023 State of Cybersecurity Automation Adoption

2023 State of Cybersecurity Automation Adoption

This is the third edition of ThreatQuotient’s annual survey of senior cybersecurity professionals, exploring the topic of cybersecurity automation adoption. Read this report to understand how CISOs and senior cybersecurity professionals are handling the incorporation of cybersecurity automation into their strategies to protect the complex, extended enterprise – and their analyst teams – from the pressures of escalating cyber threats.

(more available)
Added: November 15, 2023
image from A Data-Driven Approach to Risk-Based Vulnerability Management With ThreatQ

A Data-Driven Approach to Risk-Based Vulnerability Management With ThreatQ

This paper seeks to introduce some of the new knowledge sources and actionable data, along with a data-driven approach that puts custom cyber intelligence at the center of the process seeking to deliver the tools to help the organization stay as close to the front of the race as possible.

(more available)
Added: June 13, 2023
image from State of Cybersecurity Automation Adoption

State of Cybersecurity Automation Adoption

A survey of 250 UK cybersecurity professionals on their perspectives of the state, benefits, and challenges in security process automation.

(more available)
Added: October 5, 2021
image from 2020 SANS Cyber Threat Intelligence (CTI) Survey

2020 SANS Cyber Threat Intelligence (CTI) Survey

A lot of progress has been made in the past few years around requirements. Next steps in this area include identifying when and why to update intelligence requirements—even ad hoc adjustments can be planned for by identifying the circumstances under which they would need to be changed. It is also clear that there are numerous positive trends in the community, such as more organizations producing intelligence instead of just consuming it. But there are also many challenges, such as getting the appropriate staffing and training to conduct cyber threat intelligence. Tools and data sources are always going to be vital to the process, but the world of intelligence analysis is inherently analyst driven and a focus is rightfully placed there.

(more available)
Added: May 11, 2020
image from The Top 5 Retail Point-of-Sale Cyberthreats

The Top 5 Retail Point-of-Sale Cyberthreats

On an ongoing basis, Visa tracks global breach trends affecting retailers and other merchants. In 2017, research confirmed that the U.S. and Europe were the top two regions for payment data breaches. This report offers insight specific to Visa and their unique due diligence in the cyber threat universe.

(more available)
Added: January 31, 2019
image from EMA Radar for Digital Threat Intelligence Management: Q4 2017

EMA Radar for Digital Threat Intelligence Management: Q4 2017

This report offers insight into digital threat intelligence management.

Added: January 31, 2019
© Cyentia Institute 2025
Library updated: July 9, 2025 00:09 UTC (build b1d7be4)