Story image

ThreatQuotient and The Missing Link partner to strengthen threat operations in Australia

02 Jul 2018

Threat intelligence platform company ThreatQuotient today announced a strategic partnership and reseller agreement with The Missing Link, a provider of information technology solutions across infrastructure, security, backup and disaster recovery, mobility, internet and communications, and cloud services.

Driving threat operations throughout Australia, this alliance will aim to empower organisations with a platform purpose-built to accelerate security operations with the understanding to prioritise and act upon the most relevant threats they are facing.

Fostering collaboration between teams and their tools within a company as well as individual organisations is a key piece in securing society’s most critical information.

The Missing Link aims to streamline and transform IT technologies to help businesses achieve more with their current security operations infrastructure.

“ThreatQuotient’s position in the security operations and management market is reinforced by a rapidly increasing ecosystem of partnerships,” says ThreatQuotient APAC regional director Anthony Stitt.

ThreatQuotient works on the assumption that the foundation of intelligence-driven security is people, and has designed threat intelligence platform, ThreatQ, to accelerate security operations.

Leveraging an integrated self-tuning Threat Library, Adaptive Workbench and Open Exchange, ThreatQ has become the cornerstone of security operations and threat management systems across the globe.

In April, ThreatQuotient announced the release of a cybersecurity situation room solution, ThreatQ Investigations, to boost security teams with the context, customisation and prioritisation needed to make decisions, accelerate detection and response, and advance team collaboration.

The Missing Link CISO Aaron Bailey says, “The Missing Link is excited to be partnering with ThreatQuotient to ensure that we can provide managed security services to our clients from our new SOC facility. 

“This also provides us with the skills required to consult and advise our clients who have their own SOC facilities in how to improve and better integrate their teams with their chosen technology stacks. 

“Through ongoing discussions with the new national Joint Cyber Security Centres being created by the Australian Government, we hope to work closely with them to do our part to help increase the country’s cybersecurity resilience.”

ESET researchers break down latest arsenal of the infamous Sednit group
At the end of August 2018, the Sednit group launched a spear-phishing email campaign, in which it distributed shortened URLs that delivered first-stage Zebrocy components.
Container survey shows adoption accelerating while security concerns remain top of mind
The report features insights from over 500 IT professionals.
Google 'will do better' after G Suite passwords exposed since 2005
Fourteen years is a long time for sensitive information like usernames and passwords to be sitting ducks, unencrypted and at risk of theft and corruption.
Who's watching you? 
With privacy an increasing concern amongst the public, users should be more aware than ever of what personal data companies hold.
Fake apps on Google Play scamming users out of cryptocurrency
Fake cryptocurrency apps on Google Play have been discovered to be phishing and scamming users out of cryptocurrency, according to a new report from ESET.
Managing data to comply with privacy regulations - Micro Focus
It’s crucial for organisations to be able to access, understand, and accurately classify the data they have so they know how to treat it.
Hackbusters! Reviewing 90 days of cybersecurity incident response cases
While there are occasionally very advanced new threats, these are massively outnumbered by common-or-garden email fraud, ransomware attacks and well-worn old exploits.
SEGA turns to Palo Alto Networks for cybersecurity protection
When one of the world’s largest video game pioneers wanted to strengthen its IT defences against cyber threats, it started with firewalls and real-time threat intelligence from Palo Alto Networks.