As the SEC cyber incident disclosure rules come into effect, organizations will be forced to seriously consider giving security leaders a seat at the...
Hi, what are you looking for?
As the SEC cyber incident disclosure rules come into effect, organizations will be forced to seriously consider giving security leaders a seat at the...
Thinking through the good, the bad, and the ugly now is a process that affords us “the negative focus to survive, but a positive...
What a cloud migration strategy did for cloud adoption, an automation implementation strategy does for security automation adoption.
If you want to begin, or improve, sharing customized intelligence with key users, consider these four aspects as you develop your process.
Regardless of the use case your security organization is focused on, you’ll likely waste time and resources and make poor decisions if you don’t...
Given the crippling effects ransomware has had and indications that these types of attacks aren’t slowing down, it makes sense to look to threat...
An important area of differentiation to evaluate when you make your next security investment is the vendor’s effectiveness when it comes to customer success.
Making threat intelligence actionable requires more than automation; it also requires contextualization and prioritization.
Anna Tutt, CMO of Oort, shares her experiences and perspectives on how we can accelerate growth of women in cybersecurity.
Varied viewpoints as related security concepts take on similar traits create substantial confusion among security teams trying to evaluate and purchase security technologies.
XDR's fully loaded value to threat detection, investigation and response will only be realized when it is viewed as an architecture
Implementation of security automation can be overwhelming, and has remained a barrier to adoption