Stories by Anthony Stitt

Australia’s focus on critical infrastructure risk management
Wed, 18th Oct 2023
#
iot security
#
risk & compliance
#
cybersecurity
Australia and many other countries around the world continue to bolster cybersecurity initiatives with the goal of increased trust and verification in mind.

The increasing importance of cyber threat intelligence
Fri, 29th Apr 2022
#
uc
#
advanced persistent threat protection
#
cybersecurity
Globally, the cyber threat level to organisations remains high, and the current situation only serves to highlight this further.

Five pointers for choosing a Threat Intelligence Platform
Tue, 1st Mar 2022
#
risk & compliance
#
cybersecurity
#
software development
Companies are investing in Threat Intelligence Platforms (TIPs) to enhance cybersecurity and manage the deluge of data from disparate sources.

The state of the SOC: skills shortages, automation and gaining context remain a challenge for SOCs
Mon, 10th Jan 2022
#
soc
#
hybrid & remote work
#
cybersecurity
The security operations centre (SOC) has been on the front line facing the pandemic-induced escalation of cybersecurity threats in the past eighteen months.

Maximising your investments through security automation
Thu, 25th Nov 2021
#
cloud services
#
investment
#
threatquotient
Organizations have accelerated their plans for security automation due to the COVID-19 pandemic, with 80% now having partial automation, a new report finds.

The threat model as a compass
Wed, 3rd Nov 2021
#
advanced persistent threat protection
#
cybersecurity
#
cyber threats
Just like a compass, regularly reviewing the threat model keeps the CTI teams IR’s pointed in the right direction over time.

Anatomy of a supply chain attack: how to accelerate incident response and threat hunting
Tue, 5th Oct 2021
#
cybersecurity
#
solar power
#
cybersafety
Supply chain attacks show no sign of slowing down. But the right combination of platforms can help organisations get ahead of the threat.

What makes a security analyst successful? Investigative thinking
Thu, 2nd Sep 2021
#
cybersecurity
#
cybersafety
#
threatquotient
Empowering humans to engage in critical thinking is vital to efficient detection and response, writes ThreatQuotient APJC regional director Anthony Stitt.

Leveraging a new MSSP/MDR SOC contract to build an intelligence practice
Thu, 26th Aug 2021
#
risk & compliance
#
cybersecurity
#
solar power
Few organisations have matured their security operations (SecOps) to the point where they have integrated a complete CTI practice.

Companies must be on the same page to achieve strategic & tactical CTI management
Wed, 4th Aug 2021
#
cybersecurity
#
threat intelligence
#
cybersafety
An effective CTI program requires the alignment of people, processes and technology, writes ThreatQuotient APJC regional director Anthony Stitt.

Proactively mitigate cyber risk with MISP and TheHive
Thu, 10th Jun 2021
#
malware
#
cybersecurity
#
solar power
When an attack happens, security teams should be ready with information about who is attacking and the steps being taken to mitigate damage.

Defence engineering and threat intel — no stone left unturned
Thu, 27th May 2021
#
siem
#
threat intelligence
#
threatquotient
Understanding the limitations of defences requires examining how blocking and detection systems leverage cyber threat intelligence.

Pandemic sees organisations of all sizes and industries invest in CTI
Tue, 6th Apr 2021
#
cybersecurity
#
threat intelligence
#
cybersafety
The 2021 SANS Cyber Threat Intelligence survey reveals the growing importance of CTI as cyber-breaches and COVID-19-related attacks increase.

MITRE ATT&CK: A holistic cyber approach
Tue, 9th Mar 2021
#
advanced persistent threat protection
#
cybersecurity
#
threat intelligence
The MITRE ATT-CK framework provides a threat-informed approach to detecting and protecting against malicious attacks.

Threat intelligence platforms underpin security efficiency and effectiveness
Tue, 15th Dec 2020
#
cybersecurity
#
cybersafety
#
threatquotient
Cyber-threat fusion centres transform siloed security, enhancing cross-department intel sharing & decision-making.

Why best-practice threat data management provides confident automation
Tue, 13th Oct 2020
#
advanced persistent threat protection
#
cybersecurity
#
cybersafety
Understanding an organization's threat landscape requires the right data sources and prioritization for actionable intelligence.

Organisations already have the threat intelligence they need, finding it and actioning it is another question
Mon, 31st Aug 2020
#
phishing
#
email security
#
cybersecurity
Many organisations struggle to create an effective threat model, but internal threat intelligence data can provide valuable insights.

Why answering the question of orchestration vs automation will improve your security effectiveness
Mon, 3rd Aug 2020
#
cybersecurity
#
cybersafety
#
threatquotient
Organisations must weigh orchestrating versus automating security operations to enhance effectiveness, as cyber spending outstrips IT outlay by nearly 2:1.

Successful threat hunting requires curation & collaboration
Mon, 5th Aug 2019
#
document management
#
siem
#
ecm
Many organizations already have the technology required for threat hunting, with SIEMs and threat intelligence a starting point.

The five key steps to security automation
Mon, 30th Jul 2018
#
siem
#
it automation
#
cybersecurity
Volvo's CEO skips level 3 self-driving cars, deeming them unsafe. What lesson can we learn about automation in security operations?.