Making threat intelligence actionable requires more than automation; it also requires contextualization and prioritization.
Hi, what are you looking for?
Making threat intelligence actionable requires more than automation; it also requires contextualization and prioritization.
Anna Tutt, CMO of Oort, shares her experiences and perspectives on how we can accelerate growth of women in cybersecurity.
Varied viewpoints as related security concepts take on similar traits create substantial confusion among security teams trying to evaluate and purchase security technologies.
XDR's fully loaded value to threat detection, investigation and response will only be realized when it is viewed as an architecture
Implementation of security automation can be overwhelming, and has remained a barrier to adoption
There are two recurring themes in security that we continue to discuss, debate and, quite frankly, struggle with—automation and the talent gap.
“Wisdom consists of the anticipation of consequences.” - Norman Cousins
Cyberattacks and data breaches continue to rise year-over-year and another so-called silver bullet technology isn’t going to stop that trend. The reality is the...
Security teams need an architecture where disparate systems and sources that talk in different languages and use different formats can communicate
The goal of security automation is to accelerate detection and response, but you’ll waste a lot of time if you try to eat the...
The last few years have been filled with examples of the “Pendulum Effect”, where trends swing from one extreme to another before settling at...
Among the many improvements in cybersecurity technology and tools we’ve seen over the last few years, one of the most significant has been the...