1. What are the most common risks organizations overlook when implementing new technology?
The biggest risk a company has when implementing a new security technology is if the product is inflexible and cannot work with the existing products the customer is using to defend themselves. Cyber defense is complicated; there are a lot of disparate products defending different attack vectors within an organization. If the new technology cannot integrate effectively with the existing security infrastructure, then it becomes costly to run, and it won’t work collaboratively with the other defense technologies.
2. How do you ensure seamless integration between two companies’ technologies or solutions?
ThreatQ’s entire product and all the data within it are accessible to other technologies through well-documented APIs. ThreatQ has integration with over 450 technologies, from which it can pass and receive information. It can also take a signal from one security technology and move it to another technology. For example, a signal from a sandbox can be de-duplicated, prioritized, and then sent to an EDR product.
3. What challenges typically arise in industry partnerships, and how do you mitigate them?
One of the biggest challenges in the industry is vendors changing API’s without documenting the change and alerting their partners. However, ThreatQ mitigates this through an integration framework that is easy to use and adjusts quickly.
4. How do regulatory changes impact the adoption of emerging technologies?
While regulations are commonly perceived as changes to slow the process of acquiring and utilizing cutting edge technology, they can be mitigated by having appropriate certifications. We have also seen in recent regulations like the DOD Zero Trust Architecture in the US, DORA and NIS2 regulations in EU, or SAMA in Saudi, that regulations help organizations bolster the cyber resilience of their critical infrastructure. Most of these directives outline stringent requirements for identifying and mitigating risks, reporting incidents, sharing information, and undergoing supervision. I believe this is the right path for every organization.
5. How can organizations address security concerns related to data sharing in partnerships?
Organizations must look at what data they are sharing and with whom. ThreatQ facilitates this process by allowing the owner of the data to create sharing rules based on dynamic saved searches, termed Smart Collections.
6. What are the most common gaps between technology providers and end users?
I think sometimes technology providers develop in a bit of a vacuum and believe that the end users can instantly deploy and upgrade tools and applications. End users need to go through their processes, checks, and balances to ensure the upgrade is going to work. The whole process can be much slower and more complicated than tech providers may envision. Both technology providers and end users should schedule deployments and updates during downtime to avoid interruptions across the business and provide a buffer in case something goes wrong.
About Matt- About ThreatQuotient
As the SVP of Corporate and Business Development of ThreatQuotient, Matt McCormick focuses primarily on developing relationships that drive revenue for ThreatQuotient as well as partners. Matt has worked in the cybersecurity industry for over 20 years with experience as a programmer, cybersecurity consultant and sales engineer. Prior to joining ThreatQuotient, Matt was the VP of Business Development at Sourcefire, Inc. for 11 years prior to its $2.7 billion acquisition by Cisco Systems. At Cisco he was responsible for Strategic Alliances and running Cisco’s global security channel. Prior to Sourcefire, Matt led strategic alliances at Axent Technologies, which was purchased by Symantec in 2000. Matt has a B.S. in Engineering Science from Loyola University and an M.S. in Electrical Engineering from Bucknell University.
ThreatQuotient improves security operations by fusing together disparate data sources, tools, and teams to accelerate threat detection, investigation, and response (TDIR). ThreatQ is the first purpose-built, data-driven threat intelligence platform that helps teams prioritize, automate, and collaborate on security incidents; enables more focused decision-making; and maximizes limited resources by integrating existing processes and technologies into a unified workspace. The result is reduced noise, clear priority threats, and the ability to automate processes with high-fidelity data. ThreatQuotient’s leading integration marketplace, data management, orchestration, and automation (SOAR) capabilities support multiple use cases including threat intelligence management and sharing, incident response, threat hunting, spear phishing, alert triage, and vulnerability management. ThreatQuotient is headquartered in Northern Virginia with international operations based out of Europe, MENA, and APAC.
For more information, visit www.threatquotient.com.

Techedge AI is a niche publication dedicated to keeping its audience at the forefront of the rapidly evolving AI technology landscape. With a sharp focus on emerging trends, groundbreaking innovations, and expert insights, we cover everything from C-suite interviews and industry news to in-depth articles, podcasts, press releases, and guest posts. Join us as we explore the AI technologies shaping tomorrow’s world.