New SOC Talk Webinar: Optimizing Threat Intelligence to Maximize Incident Response - 12/9 at 2:00 PM EST. Register Now ➞

Abby Thurman

Abby brings 5 years’ experience in the tech and SaaS industry to her role as content marketing strategist for ReliaQuest. Based in Salt Lake City, she graduated with a degree in English from the University of Utah, and when she’s not working, she’s usually reading, cooking, or hanging out with her husband and pets.

Author's Posts

What Is Breach and Attack Simulation?

Breach and attack simulation is a way for organizations to test the efficacy of their security controls. This article will explore three common types of attack simulations and where these approaches can fall short. Common Attack Simulations Tabletop Exercises A tabletop exercise (TTX) simulates an actual crisis. It is a security incident preparedness activity that […]

Cybersecurity Bad Practices: Expanding on the CISA List

In cybersecurity, we all tend to focus on those covetable “best practices.” But what’s on the other side? The U.S. Cybersecurity and Infrastructure Security Agency (CISA) got the ball rolling by publishing some cybersecurity “bad practices,” especially those that relate to protecting critical infrastructure or national critical functions. Provided below are the three practices listed […]

Security Leaders in Europe Turn to Automation to Address Complexity: Survey

ReliaQuest, in partnership with the Information Security Media Group (ISMG), has released a survey of more than 200 cybersecurity professionals in Europe titled “2021 EMEA cybersecurity complexity study: How can you streamline your time to response?” The good news is: asked how they rate their organisation’s ability to respond quickly and effectively to today’s cybersecurity […]

ReliaQuest 2021 Security Leader Survey: Top Findings

ReliaQuest, in partnership with Ponemon Research, just released the results of a survey unveiling the priorities, concerns, and challenges of security operations teams. In the survey, we asked over 1,000 security leaders in the United States and the United Kingdom about how they approach security priorities in the face of today’s dynamic IT environment, the […]