The need for network security operations automation

Cloud computing, network scale and incident response demand a better model for network security operations.

08/22/16

More on operationalizing threat intelligence

Four steps to turn threat intelligence data into measurable actions and results

08/17/16

CISOs adopt a portfolio management approach for cybersecurity

With a long to-do list and perpetual skills shortage, CISOs are managing cybersecurity requirements, allocating resources and outsourcing.

08/11/16

A few thoughts from Black Hat 2016

Threats, vulnerabilities and security complexity represent serious challenges for cybersecurity professionals.

08/08/16

Anticipating Black Hat

The Black Hat conference heads to Vegas next week, with a big interest in anti-ransomware, endpoint security, security analytics, cloud and IoT security.

07/28/16

Russian DNC hack – A cybersecurity microcosm

The Russian hack of the DNC a microcosm of cybersecurity at large. Many companies are as vulnerable as the organization and as underprepared to handle such attacks.

07/27/16

Cybersecurity: A vertical industry application?

New threats, risk management and IoT may make transform cybersecurity from being a set of horizontal technologies into a vertical business application.

07/22/16

Crypto: Nominated to the Cybersecurity Canon

Crypto, Steven Levy’s classic about privacy technology pioneers, is recommended reading for all cybersecurity professionals and should be inducted into the Cybersecurity Canon.

07/19/16

Cybersecurity highlights from Cisco Live

Cisco describes its cybersecurity progress and makes several announcements.

07/14/16

Operationalizing threat intelligence

Four steps enterprises must take before they can integrate threat intelligence into their overall cybersecurity strategies

07/05/16

A FireEye chat with Kevin Mandia

FireEye focused on engineering innovation, threat intelligence utilization and security as a service rather than Wall Street capriciousness.

06/21/16

Federal cybersecurity boondoggle: The Software Assurance Marketplace (SWAMP)

The Software Assurance Marketplace is well-intended, but it suffers from a lack of relevant features, internal mismanagement and few actual users.

06/16/16

Quick take: Symantec buys Blue Coat

Blue Coat has a great management team and plenty of opportunity, but this deal comes with question marks.

06/13/16

Endpoint detection and response: What’s important?

Enterprise organizations demand that EDR products offer scalability, strong data management, flexible analytics and open integration.

06/09/16

Enterprises are investing in network security analytics

Dangerous threats and new requirements are persuading organizations to collect, process and analyze more and more network telemetry and threat intelligence.

06/03/16

Software-Defined Perimeter Essentials

SDP depends on well-thought-out policies, strong authentication, and diligent data collection and analysis

06/01/16

Are there workloads in the cloud that don’t belong there?

Enterprise organizations are willingly moving sensitive data, mission-critical applications and network-based business processes to the public cloud.

05/27/16

Identity and access management infrastructure is misaligned with security

CISOs need to overhaul their entire Identity and Access Management (IAM) infrastructure to include multi-factor authentication, consolidated identity repositories, and on-premise and cloud-based IAM technologies.

05/23/16

Cloud security: A mismatch for existing security processes and technology

Enterprises use, but often abandon, traditional security controls to protect cloud-based applications and workloads.

05/19/16

Next-generation endpoint security market bifurcation

The new endpoint security market will remain forked between advanced prevention and endpoint detection and response (EDR) products.

05/13/16

Load More