“There is a strong family resemblance about misdeeds, and if you have all the details of a thousand at your finger ends, it is...
Hi, what are you looking for?
“There is a strong family resemblance about misdeeds, and if you have all the details of a thousand at your finger ends, it is...
Even as incident response (IR) has evolved, it has struggled to see beyond individual events and create a more complete perspective. IR tools are...
Playing defense is always more difficult than being on the attack, because defense is always reactive on some level. This concept is especially true...
The RSA Conference is one of the premier events in the cybersecurity world. At times, it can be an overwhelming experience for vendors and...
Threat Intelligence Can be Used to Support Effective and Automated Incident Response
Attacks against automated teller machines (ATMs) are nothing new, for obvious reasons. They are a perfect target for both conventional thieves and hackers, standing...
Security Automation Can be a Game Changer for Any SOC or CSIRT, Including Yours
Organizations across all industries are recognizing the value of automation, and the necessity of implementing it in their security infrastructure. However, beyond the simple...
It’s the nature of security operations: the worse the situation, the more you need everything to be working perfectly. Any issues with your program...
Getting Off the Ground With Security Orchestration, Automation, and Response
Automation and Orchestration Have Evolved to Become Indispensable Security Tools
Automation and Orchestration Are More Than Just the Latest Security Buzzwords