What’s next in the evolution of security automation and orchestration?
Hi, what are you looking for?
What’s next in the evolution of security automation and orchestration?
We have a long way to go to get adequate cybersecurity expertise on boards, but the time has come to make it happen
News of cyber criminals and nation-state actors capitalizing on events, planned or unplanned, for financial gain or to wreak havoc have dominated the headlines...
No longer satisfied with infecting files or systems, adversaries are now intent on crippling entire enterprises. Damaging supply chain, ransomware and wiper attacks are...
A conversation with Callie Guenther, cyber threat intelligence (CTI) manager at Critical Start
Much has been written about the Great Resignation as its impact is widespread. Sectors including hospitality, food, retail, manufacturing and healthcare have all been...
When automation is balanced between humans and machines, we can ensure teams always have the best tool for the job
The SOC of the future must be data driven, so it’s essential that systems and tools can work together
Data is the lifeblood of security because it provides context from a wide range of internal and external sources
Every discipline has its acronyms, but I’d venture to say cybersecurity has more than its share. We use them to describe threat actors and...
An XDR implementation can quickly turn into a very large consulting project requiring significant time and budget
XDR must be approached as an open architecture where integration is the linchpinOver the past couple of months, I’ve talked about how adversaries are...