Posts

Security Orchestration & Automation: Parsing the Options

Once you head down the path of orchestration, security teams will need to decide how much automation they are ready for. Here’s how.
Source: Cyber Monitoring

Using AI to Break Detection Models

Pitting machine learning bots against one another is the new spy vs. spy battle in cybersecurity today.
Source: Cyber Monitoring

[Strategic Security Report] Assessing Cybersecurity Risk

As cyber attackers become more sophisticated and enterprise defenses become more complex, many enterprises are faced with a complicated question: what is the risk of an IT security breach? This report delivers insight on how today’s enterprises evaluate the risks they face. This report also offers a look at security professionals’ concerns about a wide variety of threats, including cloud security, mobile security, and the Internet of Things.
Source: Cyber Monitoring

How to Succeed at Incident Response Metrics

Establishing a baseline of what information you need is an essential first step.
Source: Cyber Monitoring

How to Integrate Threat Intel & DevOps

Automating intelligence can help your organization in myriad ways.
Source: Cyber Monitoring

Forget the Tax Man: Time for a DNS Security Audit

Here’s a 5-step DNS security review process that’s not too scary and will help ensure your site availability and improve user experience.
Source: Cyber Monitoring

As Cloud Use Expands, So Do Security Blind Spots, Studies Show

Three-quarters of IaaS and SaaS apps aren’t monitored.
Source: Cyber Monitoring

Data Visualization: Keeping an Eye on Security

Visualization can be one of the most powerful approaches a security team can use to make sense of vast quantities of data. So why does it end up as an afterthought?
Source: Cyber Monitoring

Prioritizing Threats: Why Most Companies Get It Wrong

To stay safer, focus on multiple-threat attack chains rather than on individual threats.
Source: Cyber Monitoring

Getting Beyond the Buzz & Hype of Threat Hunting

When harnessed properly, threat hunting can be one of the most useful techniques for finding attackers in your network. But it won’t happen overnight.
Source: Cyber Monitoring