The need for network security operations automation

Cloud computing, network scale and incident response demand a better model for network security operations.


More on operationalizing threat intelligence

Four steps to turn threat intelligence data into measurable actions and results


CISOs adopt a portfolio management approach for cybersecurity

With a long to-do list and perpetual skills shortage, CISOs are managing cybersecurity requirements, allocating resources and outsourcing.


A few thoughts from Black Hat 2016

Threats, vulnerabilities and security complexity represent serious challenges for cybersecurity professionals.


Anticipating Black Hat

The Black Hat conference heads to Vegas next week, with a big interest in anti-ransomware, endpoint security, security analytics, cloud and IoT security.


Russian DNC hack – A cybersecurity microcosm

The Russian hack of the DNC a microcosm of cybersecurity at large. Many companies are as vulnerable as the organization and as underprepared to handle such attacks.


Cybersecurity: A vertical industry application?

New threats, risk management and IoT may make transform cybersecurity from being a set of horizontal technologies into a vertical business application.


Crypto: Nominated to the Cybersecurity Canon

Crypto, Steven Levy’s classic about privacy technology pioneers, is recommended reading for all cybersecurity professionals and should be inducted into the Cybersecurity Canon.


Cybersecurity highlights from Cisco Live

Cisco describes its cybersecurity progress and makes several announcements.


Operationalizing threat intelligence

Four steps enterprises must take before they can integrate threat intelligence into their overall cybersecurity strategies


A FireEye chat with Kevin Mandia

FireEye focused on engineering innovation, threat intelligence utilization and security as a service rather than Wall Street capriciousness.


Federal cybersecurity boondoggle: The Software Assurance Marketplace (SWAMP)

The Software Assurance Marketplace is well-intended, but it suffers from a lack of relevant features, internal mismanagement and few actual users.


Quick take: Symantec buys Blue Coat

Blue Coat has a great management team and plenty of opportunity, but this deal comes with question marks.


Endpoint detection and response: What’s important?

Enterprise organizations demand that EDR products offer scalability, strong data management, flexible analytics and open integration.


Enterprises are investing in network security analytics

Dangerous threats and new requirements are persuading organizations to collect, process and analyze more and more network telemetry and threat intelligence.


Software-Defined Perimeter Essentials

SDP depends on well-thought-out policies, strong authentication, and diligent data collection and analysis


Are there workloads in the cloud that don’t belong there?

Enterprise organizations are willingly moving sensitive data, mission-critical applications and network-based business processes to the public cloud.


Identity and access management infrastructure is misaligned with security

CISOs need to overhaul their entire Identity and Access Management (IAM) infrastructure to include multi-factor authentication, consolidated identity repositories, and on-premise and cloud-based IAM technologies.


Cloud security: A mismatch for existing security processes and technology

Enterprises use, but often abandon, traditional security controls to protect cloud-based applications and workloads.


Next-generation endpoint security market bifurcation

The new endpoint security market will remain forked between advanced prevention and endpoint detection and response (EDR) products.


Load More